0% found this document useful (0 votes)
28 views180 pages

Scanprojet Semq4x

The document is a security report generated by Tenable Nessus, detailing various vulnerabilities detected in services, including SSL Version 2 and 3 Protocol Detection, which are known to have significant cryptographic flaws. It emphasizes the critical risk associated with using outdated SSL protocols and recommends disabling them in favor of TLS 1.2 or higher. The report includes a comprehensive list of vulnerabilities by plugin, along with their descriptions and risk factors.

Uploaded by

yassineothmani9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views180 pages

Scanprojet Semq4x

The document is a security report generated by Tenable Nessus, detailing various vulnerabilities detected in services, including SSL Version 2 and 3 Protocol Detection, which are known to have significant cryptographic flaws. It emphasizes the critical risk associated with using outdated SSL protocols and recommends disabling them in favor of TLS 1.2 or higher. The report includes a comprehensive list of vulnerabilities by plugin, along with their descriptions and risk factors.

Uploaded by

yassineothmani9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 180

ls

ia
nt
se
scanprojet
Es

Report generated by Tenable Nessus™ Thu, 19 Dec 2024 20:05:21 Morocco Standard Time
us
ss
Ne
TABLE OF CONTENTS

Vulnerabilities by Plugin
• 20007 (2) - SSL Version 2 and 3 Protocol Detection.............................................................................................8

• 32321 (2) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check).........11
• 32314 (1) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness............................ 13
• 46882 (1) - UnrealIRCd Backdoor Detection........................................................................................................15

• 51988 (1) - Bind Shell Backdoor Detection..........................................................................................................17

ls
• 61708 (1) - VNC Server 'password' Password......................................................................................................18

• 134862 (1) - Apache Tomcat A JP Connector Request Injection (Ghostcat)......................................................19

ia
• 171340 (1) - Apache Tomcat SEoL (<= 5.5.x)....................................................................................................... 22

nt
• 42873 (2) - SSL Medium Strength Cipher Suites Supported (SWEET32).......................................................... 23
• 10205 (1) - rlogin Service Detection..................................................................................................................... 25
se
• 10245 (1) - rsh Service Detection..........................................................................................................................27

• 42256 (1) - NFS Shares World Readable.............................................................................................................. 29


Es

90509 (1) - Samba Badlock Vulnerability............................................................................................................. 30

• 136769 (1) - ISC BIND Service Downgrade / Reflected DoS...............................................................................32

• 15901 (2) - SSL Certificate Expiry.......................................................................................................................... 34


us

• 45411 (2) - SSL Certificate with Wrong Hostname............................................................................................. 36

• 51192 (2) - SSL Certificate Cannot Be Trusted.................................................................................................... 38


ss

• 57582 (2) - SSL Self-Signed Certificate................................................................................................................. 40

• 65821 (2) - SSL RC4 Cipher Suites Supported (Bar Mitzvah)............................................................................. 42


Ne

• 104743 (2) - TLS Version 1.0 Protocol Detection................................................................................................ 45

• 11213 (1) - HTTP TRACE / TRACK Methods Allowed........................................................................................... 47

• 12085 (1) - Apache Tomcat Default Files............................................................................................................. 50

• 12217 (1) - DNS Server Cache Snooping Remote Information Disclosure...................................................... 52


• 26928 (1) - SSL Weak Cipher Suites Supported.................................................................................................. 54

• 31705 (1) - SSL Anonymous Cipher Suites Supported....................................................................................... 56

• 33447 (1) - Multiple Vendor DNS Query ID Field Prediction Cache Poisoning................................................ 58
• 42263 (1) - Unencrypted Telnet Server................................................................................................................ 60
• 52611 (1) - SMTP Service STARTTLS Plaintext Command Injection.................................................................. 62

• 57608 (1) - SMB Signing not required.................................................................................................................. 64

• 81606 (1) - SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK).............................................. 66
• 89058 (1) - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened
eNcryption).................................................................................................................................................................. 68

• 136808 (1) - ISC BIND Denial of Service.............................................................................................................. 70

• 139915 (1) - ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS........................................................72
• 78479 (2) - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)................... 74
• 10114 (1) - ICMP Timestamp Request Remote Date Disclosure.......................................................................76

• 10407 (1) - X Server Detection.............................................................................................................................. 78

• 83738 (1) - SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam)............................... 79
• 83875 (1) - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)................................................................ 81

• 11219 (25) - Nessus SYN scanner......................................................................................................................... 83

• 11111 (10) - RPC Services Enumeration...............................................................................................................86

• 22964 (8) - Service Detection................................................................................................................................ 89

• 10107 (2) - HTTP Server Type and Version..........................................................................................................91

• 10863 (2) - SSL Certificate Information................................................................................................................ 92

• 11002 (2) - DNS Server Detection.........................................................................................................................95

• 11011 (2) - Microsoft Windows SMB Service Detection..................................................................................... 96

• 11154 (2) - Unknown Service Detection: Banner Retrieval................................................................................97

• 21643 (2) - SSL Cipher Suites Supported.............................................................................................................99

• 22227 (2) - RMI Registry Detection.....................................................................................................................101

• 24260 (2) - HyperText Transfer Protocol (HTTP) Information..........................................................................102

• 45410 (2) - SSL Certificate 'commonName' Mismatch..................................................................................... 105

• 50845 (2) - OpenSSL Detection........................................................................................................................... 106

• 56984 (2) - SSL / TLS Versions Supported......................................................................................................... 107

• 57041 (2) - SSL Perfect Forward Secrecy Cipher Suites Supported................................................................108

• 62563 (2) - SSL Compression Methods Supported.......................................................................................... 110

• 70544 (2) - SSL Cipher Block Chaining Cipher Suites Supported....................................................................111

• 156899 (2) - SSL/TLS Recommended Cipher Suites......................................................................................... 113


• 10028 (1) - DNS Server BIND version Directive Remote Version Detection.................................................. 116
• 10092 (1) - FTP Server Detection........................................................................................................................ 117

• 10150 (1) - Windows NetBIOS / SMB Remote Host Information Disclosure................................................. 118
• 10223 (1) - RPC portmapper Service Detection................................................................................................ 119

• 10263 (1) - SMTP Server Detection.....................................................................................................................120

• 10267 (1) - SSH Server Type and Version Information.................................................................................... 121

• 10281 (1) - Telnet Server Detection....................................................................................................................122

• 10287 (1) - Traceroute Information.................................................................................................................... 123

• 10342 (1) - VNC Software Detection...................................................................................................................124

• 10397 (1) - Microsoft Windows SMB LanMan Pipe Server Listing Disclosure............................................... 125
• 10437 (1) - NFS Share Export List.......................................................................................................................126

• 10719 (1) - MySQL Server Detection.................................................................................................................. 127

• 10785 (1) - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure............ 128
• 10881 (1) - SSH Protocol Versions Supported...................................................................................................129

• 11153 (1) - Service Detection (HELP Request)...................................................................................................130

• 11156 (1) - IRC Daemon Version Detection.......................................................................................................131

• 11422 (1) - Web Server Unconfigured - Default Install Page Present............................................................ 132
• 11424 (1) - WebDAV Detection............................................................................................................................133

• 11819 (1) - TFTP Daemon Detection.................................................................................................................. 134

• 11936 (1) - OS Identification................................................................................................................................135

• 17975 (1) - Service Detection (GET request)......................................................................................................136

• 18261 (1) - Apache Banner Linux Distribution Disclosure...............................................................................137

• 19288 (1) - VNC Server Security Type Detection...............................................................................................138

• 19506 (1) - Nessus Scan Information.................................................................................................................139

• 20094 (1) - VMware Virtual Machine Detection................................................................................................ 141

• 20108 (1) - Web Server / Application favicon.ico Vendor Fingerprinting....................................................... 142


• 21186 (1) - A JP Connector Detection................................................................................................................. 143

• 25220 (1) - TCP/IP Timestamps Supported....................................................................................................... 144

• 25240 (1) - Samba Server Detection.................................................................................................................. 145


• 26024 (1) - PostgreSQL Server Detection.......................................................................................................... 146

• 35371 (1) - DNS Server hostname.bind Map Hostname Disclosure.............................................................. 147

• 35373 (1) - DNS Server DNSSEC Aware Resolver............................................................................................. 148

• 35716 (1) - Ethernet Card Manufacturer Detection......................................................................................... 149

• 39446 (1) - Apache Tomcat Detection................................................................................................................ 150

• 39520 (1) - Backported Security Patch Detection (SSH)...................................................................................151

• 39521 (1) - Backported Security Patch Detection (WWW)............................................................................... 152

• 42088 (1) - SMTP Service STARTTLS Command Support................................................................................. 153

• 45590 (1) - Common Platform Enumeration (CPE)...........................................................................................155

• 48204 (1) - Apache HTTP Server Version...........................................................................................................157

• 48243 (1) - PHP Version Detection..................................................................................................................... 158

• 51891 (1) - SSL Session Resume Supported..................................................................................................... 159

• 52703 (1) - vsftpd Detection................................................................................................................................160

• 53335 (1) - RPC portmapper (TCP)..................................................................................................................... 161

• 54615 (1) - Device Type........................................................................................................................................162

• 65792 (1) - VNC Server Unencrypted Communication Detection...................................................................163

• 66334 (1) - Patch Report...................................................................................................................................... 164

• 72779 (1) - DNS Server Version Detection.........................................................................................................165

• 84574 (1) - Backported Security Patch Detection (PHP).................................................................................. 166

• 86420 (1) - Ethernet MAC Addresses................................................................................................................. 167

• 96982 (1) - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check).................... 168
• 100871 (1) - Microsoft Windows SMB Versions Supported (remote check).................................................. 170
• 104887 (1) - Samba Version................................................................................................................................ 171

• 106716 (1) - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)...............................172
• 110723 (1) - Target Credential Status by Authentication Protocol - No Credentials Provided.....................173
• 117886 (1) - OS Security Patch Assessment Not Available..............................................................................175

• 118224 (1) - PostgreSQL STARTTLS Support..................................................................................................... 176

• 135860 (1) - WMI Not Available.......................................................................................................................... 178

• 149334 (1) - SSH Password Authentication Accepted...................................................................................... 179


• 181418 (1) - OpenSSH Detection........................................................................................................................ 180
ls
ia
nt
se
Vulnerabilities by Plugin
Es
us
ss
Ne
20007 (2) - SSL Version 2 and 3 Protocol Detection

Synopsis

The remote service encrypts traffic using a protocol with known weaknesses.

Description

The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are
affected by several cryptographic flaws, including:

- An insecure padding scheme with CBC ciphers.

ls
- Insecure session renegotiation and resumption schemes.

ia
An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications
between the affected service and clients.

Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so

nt
that these versions will be used only if the client or server support nothing better), many web browsers
implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE).
Therefore, it is recommended that these protocols be disabled entirely.
se
NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of
enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong
cryptography'.
Es

See Also

https://www.schneier.com/academic/paperfiles/paper-ssl.pdf
http://www.nessus.org/u?b06c7e95
us

http://www.nessus.org/u?247c4540
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://www.nessus.org/u?5d15ba70
ss

https://www.imperialviolet.org/2014/10/14/poodle.html
https://tools.ietf.org/html/rfc7507
Ne

https://tools.ietf.org/html/rfc7568

Solution

Consult the application's documentation to disable SSL 2.0 and 3.0.


Use TLS 1.2 (with approved cipher suites) or higher instead.

Risk Factor

Critical

20007 (2) - SSL Version 2 and 3 Protocol Detection 8


CVSS v3.0 Base Score

9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Plugin Information

Published: 2005/10/12, Modified: 2022/04/04

Plugin Output

192.168.11.129 (tcp/25/smtp)

- SSLv2 is enabled and the server supports at least one cipher.

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 RSA(512) RSA RC4(40) MD5
export

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 RSA RSA 3DES-CBC(168) MD5

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 RSA RSA RC4(128) MD5

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

- SSLv3 is enabled and the server supports at least one cipher.


Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA DH RSA DES-CBC(56) SHA
[...]

20007 (2) - SSL Version 2 and 3 Protocol Detection 9


192.168.11.129 (tcp/5432/postgresql)

- SSLv3 is enabled and the server supports at least one cipher.


Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA DH RSA AES-CBC(256)
SHA1
AES128-SHA RSA RSA AES-CBC(128)
SHA1
AES256-SHA RSA RSA AES-CBC(256)
SHA1
RC4-SHA RSA RSA RC4(128)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

20007 (2) - SSL Version 2 and 3 Protocol Detection 10


32321 (2) - Debian OpenSSH/OpenSSL Package Random Number Generator
Weakness (SSL check)

Synopsis

The remote SSL certificate uses a weak key.

Description

The remote x509 certificate on the remote SSL server has been generated on a Debian or Ubuntu system
which contains a bug in the random number generator of its OpenSSL library.

ls
The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.

ia
An attacker can easily obtain the private part of the remote key and use this to decipher the remote session
or set up a man in the middle attack.

nt
See Also

http://www.nessus.org/u?107f9bdc
se
http://www.nessus.org/u?f14f4224

Solution
Es

Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH,
SSL and OpenVPN key material should be re-generated.
us

Risk Factor

Critical
ss

VPR Score

5.1
Ne

EPSS Score

0.2029

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.3 (CVSS2#E:F/RL:OF/RC:C)

32321 (2) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check) 11
References

BID 29179
CVE CVE-2008-0166
XREF CWE:310

Exploitable With

Core Impact (true)

Plugin Information

Published: 2008/05/15, Modified: 2020/11/16

Plugin Output

192.168.11.129 (tcp/25/smtp)
192.168.11.129 (tcp/5432/postgresql)

32321 (2) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check) 12
32314 (1) - Debian OpenSSH/OpenSSL Package Random Number Generator
Weakness

Synopsis

The remote SSH host keys are weak.

Description

The remote SSH host key has been generated on a Debian or Ubuntu system which contains a bug in the
random number generator of its OpenSSL library.

ls
The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.

ia
An attacker can easily obtain the private part of the remote key and use this to set up decipher the remote
session or set up a man in the middle attack.

nt
See Also

http://www.nessus.org/u?107f9bdc
se
http://www.nessus.org/u?f14f4224

Solution
Es

Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH,
SSL and OpenVPN key material should be re-generated.
us

Risk Factor

Critical
ss

VPR Score

5.1
Ne

EPSS Score

0.2029

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.3 (CVSS2#E:F/RL:OF/RC:C)

32314 (1) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness 13


References

BID 29179
CVE CVE-2008-0166
XREF CWE:310

Exploitable With

Core Impact (true)

Plugin Information

Published: 2008/05/14, Modified: 2024/07/24

Plugin Output

192.168.11.129 (tcp/22/ssh)

32314 (1) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness 14


46882 (1) - UnrealIRCd Backdoor Detection

Synopsis

The remote IRC server contains a backdoor.

Description

The remote IRC server is a version of UnrealIRCd with a backdoor that allows an attacker to execute
arbitrary code on the affected host.

ls
See Also

https://seclists.org/fulldisclosure/2010/Jun/277

ia
https://seclists.org/fulldisclosure/2010/Jun/284
http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt

nt
Solution

Re-download the software, verify it using the published MD5 / SHA1 checksums, and re-install it.
se
Risk Factor
Es

Critical

VPR Score
us

7.4

EPSS Score
ss

0.6956

CVSS v2.0 Base Score


Ne

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.3 (CVSS2#E:F/RL:OF/RC:C)

References

BID 40820
CVE CVE-2010-2075

46882 (1) - UnrealIRCd Backdoor Detection 15


Exploitable With

CANVAS (true) Metasploit (true)

Plugin Information

Published: 2010/06/14, Modified: 2022/04/11

Plugin Output

192.168.11.129 (tcp/6667/irc)

The remote IRC server is running as :

uid=0(root) gid=0(root)

46882 (1) - UnrealIRCd Backdoor Detection 16


51988 (1) - Bind Shell Backdoor Detection

Synopsis

The remote host may have been compromised.

Description

A shell is listening on the remote port without any authentication being required. An attacker may use it by
connecting to the remote port and sending commands directly.

ls
Solution

Verify if the remote host has been compromised, and reinstall the system if necessary.

ia
Risk Factor

nt
Critical

CVSS v3.0 Base Score


se
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVSS v2.0 Base Score


Es

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Plugin Information
us

Published: 2011/02/15, Modified: 2022/04/11

Plugin Output
ss

192.168.11.129 (tcp/1524/wild_shell)
Ne

Nessus was able to execute the command "id" using the


following request :

This produced the following truncated output (limited to 10 lines) :


------------------------------ snip ------------------------------
root@metasploitable:/# uid=0(root) gid=0(root) groups=0(root)
root@metasploitable:/#

------------------------------ snip ------------------------------

51988 (1) - Bind Shell Backdoor Detection 17


61708 (1) - VNC Server 'password' Password

Synopsis

A VNC server running on the remote host is secured with a weak password.

Description

The VNC server running on the remote host is secured with a weak password. Nessus was able to login
using VNC authentication and a password of 'password'. A remote, unauthenticated attacker could exploit
this to take control of the system.

ls
Solution

ia
Secure the VNC service with a strong password.

Risk Factor

nt
Critical se
CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Es

Plugin Information

Published: 2012/08/29, Modified: 2015/09/24


us

Plugin Output

192.168.11.129 (tcp/5900/vnc)
ss

Nessus logged in using a password of "password".


Ne

61708 (1) - VNC Server 'password' Password 18


134862 (1) - Apache Tomcat A JP Connector Request Injection (Ghostcat)

Synopsis

There is a vulnerable A JP connector listening on the remote host.

Description

A file read/inclusion vulnerability was found in A JP connector. A remote, unauthenticated attacker could
exploit this vulnerability to read web application files from a vulnerable server. In instances where the
vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within
a variety of file types and gain remote code execution (RCE).

ls
See Also

ia
http://www.nessus.org/u?8ebe6246
http://www.nessus.org/u?4e287adb

nt
http://www.nessus.org/u?cbc3d54e
https://access.redhat.com/security/cve/CVE-2020-1745
https://access.redhat.com/solutions/4851251
se
http://www.nessus.org/u?dd218234
http://www.nessus.org/u?dd772531
Es

http://www.nessus.org/u?2a01d6bf
http://www.nessus.org/u?3b5af27e
http://www.nessus.org/u?9dab109f
http://www.nessus.org/u?5eafcf70
us

Solution
ss

Update the A JP configuration to require authorization and/or upgrade the Tomcat server to 7.0.100, 8.5.51,
9.0.31 or later.
Ne

Risk Factor

High

CVSS v3.0 Base Score

9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVSS v3.0 Temporal Score

9.4 (CVSS:3.0/E:H/RL:O/RC:C)

134862 (1) - Apache Tomcat A JP Connector Request Injection (Ghostcat) 19


VPR Score

9.0

EPSS Score

0.9742

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

6.5 (CVSS2#E:H/RL:OF/RC:C)

References

CVE CVE-2020-1745
CVE CVE-2020-1938
XREF CISA-KNOWN-EXPLOITED:2022/03/17
XREF CEA-ID:CEA-2020-0021

Plugin Information

Published: 2020/03/24, Modified: 2024/07/17

Plugin Output

192.168.11.129 (tcp/8009/ajp13)

Nessus was able to exploit the issue using the following request :

0x0000: 02 02 00 08 48 54 54 50 2F 31 2E 31 00 00 0F 2F ....HTTP/1.1.../
0x0010: 61 73 64 66 2F 78 78 78 78 78 2E 6A 73 70 00 00 asdf/xxxxx.jsp..
0x0020: 09 6C 6F 63 61 6C 68 6F 73 74 00 FF FF 00 09 6C .localhost.....l
0x0030: 6F 63 61 6C 68 6F 73 74 00 00 50 00 00 09 A0 06 ocalhost..P.....
0x0040: 00 0A 6B 65 65 70 2D 61 6C 69 76 65 00 00 0F 41 ..keep-alive...A
0x0050: 63 63 65 70 74 2D 4C 61 6E 67 75 61 67 65 00 00 ccept-Language..
0x0060: 0E 65 6E 2D 55 53 2C 65 6E 3B 71 3D 30 2E 35 00 .en-US,en;q=0.5.
0x0070: A0 08 00 01 30 00 00 0F 41 63 63 65 70 74 2D 45 ....0...Accept-E
0x0080: 6E 63 6F 64 69 6E 67 00 00 13 67 7A 69 70 2C 20 ncoding...gzip,
0x0090: 64 65 66 6C 61 74 65 2C 20 73 64 63 68 00 00 0D deflate, sdch...
0x00A0: 43 61 63 68 65 2D 43 6F 6E 74 72 6F 6C 00 00 09 Cache-Control...
0x00B0: 6D 61 78 2D 61 67 65 3D 30 00 A0 0E 00 07 4D 6F max-age=0.....Mo
0x00C0: 7A 69 6C 6C 61 00 00 19 55 70 67 72 61 64 65 2D zilla...Upgrade-
0x00D0: 49 6E 73 65 63 75 72 65 2D 52 65 71 75 65 73 74 Insecure-Request
0x00E0: 73 00 00 01 31 00 A0 01 00 09 74 65 78 74 2F 68 s...1.....text/h
0x00F0: 74 6D 6C 00 A0 0B 00 09 6C 6F 63 61 6C 68 6F 73 tml.....localhos
0x0100: 74 00 0A 00 21 6A 61 76 61 78 2E 73 65 72 76 6C t...!javax.servl
0x0110: 65 74 2E 69 6E 63 6C 75 64 65 2E 72 65 71 75 65 et.include.reque
0x0120: 73 74 5F 75 72 69 00 00 01 31 00 0A 00 1F 6A 61 st_uri...1....ja
0x0130: 76 61 78 2E 73 65 72 76 6C 65 74 2E 69 6E 63 6C vax.servlet.incl
0x0140: 75 64 65 2E 70 61 74 68 5F 69 6E 66 6F 00 00 10 ude.path_info...
0x0150: 2F 57 45 42 2D 49 4E 46 2F 77 65 62 2E 78 6D 6C /WEB-INF/web.xml

134862 (1) - Apache Tomcat A JP Connector Request Injection (Ghostcat) 20


0x0160: 00 0A 00 22 6A 61 76 61 78 2E 73 65 72 76 6C 65 ..."javax.servle
0x0170: 74 2E 69 6E 63 6C 75 64 65 2E 73 65 72 76 6C 65 t.include.servle
0x0180: 74 5F 70 61 74 68 00 00 00 00 FF t_path.....

This produced the following truncated output (limite [...]

134862 (1) - Apache Tomcat A JP Connector Request Injection (Ghostcat) 21


171340 (1) - Apache Tomcat SEoL (<= 5.5.x)

Synopsis

An unsupported version of Apache Tomcat is installed on the remote host.

Description

According to its version, Apache Tomcat is less than or equal to 5.5.x. It is, therefore, no longer maintained
by its vendor or provider.

Lack of support implies that no new security patches for the product will be released by the vendor. As a

ls
result, it may contain security vulnerabilities.

ia
See Also

https://tomcat.apache.org/tomcat-55-eol.html

nt
Solution

Upgrade to a version of Apache Tomcat that is currently supported.


se
Risk Factor
Es

Critical

CVSS v3.0 Base Score


us

10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

CVSS v2.0 Base Score


ss

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Plugin Information
Ne

Published: 2023/02/10, Modified: 2024/05/06

Plugin Output

192.168.11.129 (tcp/8180/www)

URL : http://192.168.11.129:8180/
Installed version : 5.5
Security End of Life : September 29, 2012
Time since Security End of Life (Est.) : >= 12 years

171340 (1) - Apache Tomcat SEoL (<= 5.5.x) 22


42873 (2) - SSL Medium Strength Cipher Suites Supported (SWEET32)

Synopsis

The remote service supports the use of medium strength SSL ciphers.

Description

The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards
medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that
uses the 3DES encryption suite.

ls
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same
physical network.

ia
See Also

https://www.openssl.org/blog/blog/2016/08/24/sweet32/

nt
https://sweet32.info
se
Solution

Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Es

Risk Factor

Medium
us

CVSS v3.0 Base Score

7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
ss

VPR Score

5.1
Ne

EPSS Score

0.0398

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

References

CVE CVE-2016-2183

42873 (2) - SSL Medium Strength Cipher Suites Supported (SWEET32) 23


Plugin Information

Published: 2009/11/23, Modified: 2021/02/03

Plugin Output

192.168.11.129 (tcp/25/smtp)

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 0x07, 0x00, 0xC0 RSA RSA 3DES-CBC(168) MD5
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.11.129 (tcp/5432/postgresql)

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

42873 (2) - SSL Medium Strength Cipher Suites Supported (SWEET32) 24


10205 (1) - rlogin Service Detection

Synopsis

The rlogin service is running on the remote host.

Description

The rlogin service is running on the remote host. This service is vulnerable since data is passed between
the rlogin client and server in cleartext. A man-in-the-middle attacker can exploit this to sniff logins and
passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable
to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local

ls
network) then it may be possible to bypass authentication.
Finally, rlogin is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files.

ia
Solution

nt
Comment out the 'login' line in /etc/inetd.conf and restart the inetd process. Alternatively, disable this
service and use SSH instead.
se
Risk Factor

High
Es

VPR Score

7.4
us

EPSS Score

0.015
ss

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Ne

References

CVE CVE-1999-0651

Exploitable With

Metasploit (true)

Plugin Information

Published: 1999/08/30, Modified: 2022/04/11

10205 (1) - rlogin Service Detection 25


Plugin Output

192.168.11.129 (tcp/513/rlogin)

10205 (1) - rlogin Service Detection 26


10245 (1) - rsh Service Detection

Synopsis

The rsh service is running on the remote host.

Description

The rsh service is running on the remote host. This service is vulnerable since data is passed between
the rsh client and server in cleartext. A man-in-the-middle attacker can exploit this to sniff logins and
passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable
to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local

ls
network) then it may be possible to bypass authentication.
Finally, rsh is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files.

ia
Solution

nt
Comment out the 'rsh' line in /etc/inetd.conf and restart the inetd process. Alternatively, disable this service
and use SSH instead.
se
Risk Factor

High
Es

VPR Score

7.4
us

EPSS Score

0.015
ss

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Ne

References

CVE CVE-1999-0651

Exploitable With

Metasploit (true)

Plugin Information

Published: 1999/08/22, Modified: 2022/04/11

10245 (1) - rsh Service Detection 27


Plugin Output

192.168.11.129 (tcp/514/rsh)

10245 (1) - rsh Service Detection 28


42256 (1) - NFS Shares World Readable

Synopsis

The remote NFS server exports world-readable shares.

Description

The remote NFS server is exporting one or more shares without restricting access (based on hostname, IP,
or IP range).

ls
See Also

http://www.tldp.org/HOWTO/NFS-HOWTO/security.html

ia
Solution

nt
Place the appropriate restrictions on all NFS shares.

Risk Factor
se
Medium
Es

CVSS v3.0 Base Score

7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVSS v2.0 Base Score


us

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
ss

Plugin Information

Published: 2009/10/26, Modified: 2024/02/21


Ne

Plugin Output

192.168.11.129 (tcp/2049/rpc-nfs)

The following shares have no access restrictions :

/ *

42256 (1) - NFS Shares World Readable 29


90509 (1) - Samba Badlock Vulnerability

Synopsis

An SMB server running on the remote host is affected by the Badlock vulnerability.

Description

The version of Samba, a CIFS/SMB server for Linux and Unix, running on the remote host is affected by
a flaw, known as Badlock, that exists in the Security Account Manager (SAM) and Local Security Authority
(Domain Policy) (LSAD) protocols due to improper authentication level negotiation over Remote Procedure
Call (RPC) channels. A man-in-the-middle attacker who is able to able to intercept the traffic between a

ls
client and a server hosting a SAM database can exploit this flaw to force a downgrade of the authentication
level, which allows the execution of arbitrary Samba network calls in the context of the intercepted user,
such as viewing or modifying sensitive security data in the Active Directory (AD) database or disabling

ia
critical services.

nt
See Also

http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html
se
Solution
Es

Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later.

Risk Factor
us

Medium

CVSS v3.0 Base Score


ss

7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVSS v3.0 Temporal Score


Ne

6.5 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score

5.9

EPSS Score

0.0489

CVSS v2.0 Base Score

90509 (1) - Samba Badlock Vulnerability 30


6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 86002
CVE CVE-2016-2118
XREF CERT:813296

Plugin Information

Published: 2016/04/13, Modified: 2019/11/20

Plugin Output

192.168.11.129 (tcp/445/cifs)

Nessus detected that the Samba Badlock patch has not been applied.

90509 (1) - Samba Badlock Vulnerability 31


136769 (1) - ISC BIND Service Downgrade / Reflected DoS

Synopsis

The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.

Description

According to its self-reported version, the instance of ISC BIND 9 running on the remote name server
is affected by performance downgrade and Reflected DoS vulnerabilities. This is due to BIND DNS not
sufficiently limiting the number fetches which may be performed while processing a referral response.

ls
An unauthenticated, remote attacker can exploit this to cause degrade the service of the recursive server or
to use the affected server as a reflector in a reflection attack.

ia
See Also

https://kb.isc.org/docs/cve-2020-8616

Solution
nt
se
Upgrade to the ISC BIND version referenced in the vendor advisory.

Risk Factor
Es

Medium

CVSS v3.0 Base Score


us

8.6 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)

CVSS v3.0 Temporal Score


ss

7.7 (CVSS:3.0/E:P/RL:O/RC:C)
Ne

VPR Score

5.2

EPSS Score

0.0053

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

136769 (1) - ISC BIND Service Downgrade / Reflected DoS 32


CVSS v2.0 Temporal Score

3.9 (CVSS2#E:POC/RL:OF/RC:C)

STIG Severity

References

CVE CVE-2020-8616
XREF IAVA:2020-A-0217-S

Plugin Information

Published: 2020/05/22, Modified: 2024/03/12

Plugin Output

192.168.11.129 (udp/53/dns)

Installed version : 9.4.2


Fixed version : 9.11.19

136769 (1) - ISC BIND Service Downgrade / Reflected DoS 33


15901 (2) - SSL Certificate Expiry

Synopsis

The remote server's SSL certificate has already expired.

Description

This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and
reports whether any have already expired.

ls
Solution

Purchase or generate a new SSL certificate to replace the existing one.

ia
Risk Factor

nt
Medium

CVSS v3.0 Base Score


se
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v2.0 Base Score


Es

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Plugin Information
us

Published: 2004/12/03, Modified: 2021/02/03

Plugin Output
ss

192.168.11.129 (tcp/25/smtp)
Ne

The SSL certificate has already expired :

Subject : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA,


OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain,
emailAddress=root@ubuntu804-base.localdomain
Issuer : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA,
OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain,
emailAddress=root@ubuntu804-base.localdomain
Not valid before : Mar 17 14:07:45 2010 GMT
Not valid after : Apr 16 14:07:45 2010 GMT

192.168.11.129 (tcp/5432/postgresql)

The SSL certificate has already expired :

15901 (2) - SSL Certificate Expiry 34


Subject : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA,
OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain,
emailAddress=root@ubuntu804-base.localdomain
Issuer : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA,
OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain,
emailAddress=root@ubuntu804-base.localdomain
Not valid before : Mar 17 14:07:45 2010 GMT
Not valid after : Apr 16 14:07:45 2010 GMT

15901 (2) - SSL Certificate Expiry 35


45411 (2) - SSL Certificate with Wrong Hostname

Synopsis

The SSL certificate for this service is for a different host.

Description

The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.

Solution

ls
Purchase or generate a proper SSL certificate for this service.

ia
Risk Factor

Medium

nt
CVSS v3.0 Base Score
se
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v2.0 Base Score


Es

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Plugin Information
us

Published: 2010/04/03, Modified: 2020/04/27

Plugin Output
ss

192.168.11.129 (tcp/25/smtp)
Ne

The identities known by Nessus are :

192.168.11.129
192.168.11.129

The Common Name in the certificate is :

ubuntu804-base.localdomain

192.168.11.129 (tcp/5432/postgresql)

The identities known by Nessus are :

192.168.11.129
192.168.11.129

45411 (2) - SSL Certificate with Wrong Hostname 36


The Common Name in the certificate is :

ubuntu804-base.localdomain

45411 (2) - SSL Certificate with Wrong Hostname 37


51192 (2) - SSL Certificate Cannot Be Trusted

Synopsis

The SSL certificate for this service cannot be trusted.

Description

The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which
the chain of trust can be broken, as stated below :

- First, the top of the certificate chain sent by the server might not be descended from a known public

ls
certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are missing that would connect the top of the certificate chain
to a known public certificate authority.

ia
- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the

nt
certificate's 'notAfter' dates.

- Third, the certificate chain may contain a signature that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be
se
re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a
signing algorithm that Nessus either does not support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users
to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-
Es

middle attacks against the remote host.

See Also
us

https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509
ss

Solution

Purchase or generate a proper SSL certificate for this service.


Ne

Risk Factor

Medium

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVSS v2.0 Base Score

6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

51192 (2) - SSL Certificate Cannot Be Trusted 38


Plugin Information

Published: 2010/12/15, Modified: 2020/04/27

Plugin Output

192.168.11.129 (tcp/25/smtp)

The following certificate was part of the certificate chain


sent by the remote host, but it has expired :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain
|-Not After : Apr 16 14:07:45 2010 GMT

The following certificate was at the top of the certificate


chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain
|-Issuer : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for
Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain

192.168.11.129 (tcp/5432/postgresql)

The following certificate was part of the certificate chain


sent by the remote host, but it has expired :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain
|-Not After : Apr 16 14:07:45 2010 GMT

The following certificate was at the top of the certificate


chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain
|-Issuer : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for
Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain

51192 (2) - SSL Certificate Cannot Be Trusted 39


57582 (2) - SSL Self-Signed Certificate

Synopsis

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

Description

The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote
host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-
middle attack against the remote host.

ls
Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but
is signed by an unrecognized certificate authority.

ia
Solution

Purchase or generate a proper SSL certificate for this service.

Risk Factor

nt
se
Medium

CVSS v3.0 Base Score


Es

6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVSS v2.0 Base Score


us

6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

Plugin Information
ss

Published: 2012/01/17, Modified: 2022/06/14

Plugin Output
Ne

192.168.11.129 (tcp/25/smtp)

The following certificate was found at the top of the certificate


chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain

192.168.11.129 (tcp/5432/postgresql)

57582 (2) - SSL Self-Signed Certificate 40


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain

57582 (2) - SSL Self-Signed Certificate 41


65821 (2) - SSL RC4 Cipher Suites Supported (Bar Mitzvah)

Synopsis

The remote service supports the use of the RC4 cipher.

Description

The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of
small biases are introduced into the stream, decreasing its randomness.

ls
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of
millions) ciphertexts, the attacker may be able to derive the plaintext.

ia
See Also

nt
https://www.rc4nomore.com/
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
se
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
Es

Solution

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with
AES-GCM suites subject to browser and web server support.
us

Risk Factor

Medium
ss

CVSS v3.0 Base Score


Ne

5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVSS v3.0 Temporal Score

5.4 (CVSS:3.0/E:U/RL:X/RC:C)

VPR Score

4.4

EPSS Score

0.0079

65821 (2) - SSL RC4 Cipher Suites Supported (Bar Mitzvah) 42


CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:ND/RC:C)

References

BID 58796
BID 73684
CVE CVE-2013-2566
CVE CVE-2015-2808

Plugin Information

Published: 2013/04/05, Modified: 2021/02/03

Plugin Output

192.168.11.129 (tcp/25/smtp)

List of RC4 cipher suites supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5
export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 0x01, 0x00, 0x80 RSA RSA RC4(128) MD5
ADH-RC4-MD5 0x00, 0x18 DH None RC4(128) MD5
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.11.129 (tcp/5432/postgresql)

65821 (2) - SSL RC4 Cipher Suites Supported (Bar Mitzvah) 43


List of RC4 cipher suites supported by the remote server :

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
RC4-SHA 0x00, 0x05 RSA RSA RC4(128)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

65821 (2) - SSL RC4 Cipher Suites Supported (Bar Mitzvah) 44


104743 (2) - TLS Version 1.0 Protocol Detection

Synopsis

The remote service encrypts traffic using an older version of TLS.

Description

The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic
design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like
1.2 and 1.3 are designed against these flaws and should be used whenever possible.

ls
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly
with major web browsers and major vendors.

ia
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and
the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any
known exploits.

nt
See Also

https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
se
Solution
Es

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

Risk Factor
us

Medium

CVSS v3.0 Base Score


ss

6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)

CVSS v2.0 Base Score


Ne

6.1 (CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N)

References

XREF CWE:327

Plugin Information

Published: 2017/11/22, Modified: 2023/04/19

Plugin Output

104743 (2) - TLS Version 1.0 Protocol Detection 45


192.168.11.129 (tcp/25/smtp)

TLSv1 is enabled and the server supports at least one cipher.

192.168.11.129 (tcp/5432/postgresql)

TLSv1 is enabled and the server supports at least one cipher.

104743 (2) - TLS Version 1.0 Protocol Detection 46


11213 (1) - HTTP TRACE / TRACK Methods Allowed

Synopsis

Debugging functions are enabled on the remote web server.

Description

The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods
that are used to debug web server connections.

ls
See Also

http://www.nessus.org/u?e979b5cb

ia
http://www.apacheweek.com/issues/03-01-24
https://download.oracle.com/sunalerts/1000718.1.html

nt
Solution

Disable these HTTP methods. Refer to the plugin output for more information.
se
Risk Factor
Es

Medium

CVSS v3.0 Base Score


us

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVSS v3.0 Temporal Score


ss

4.6 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score
Ne

4.0

EPSS Score

0.0225

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

11213 (1) - HTTP TRACE / TRACK Methods Allowed 47


3.7 (CVSS2#E:U/RL:OF/RC:C)

References

BID 9506
BID 9561
BID 11604
BID 33374
BID 37995
CVE CVE-2003-1567
CVE CVE-2004-2320
CVE CVE-2010-0386
XREF CERT:288308
XREF CERT:867593
XREF CWE:16
XREF CWE:200

Plugin Information

Published: 2003/01/23, Modified: 2024/04/09

Plugin Output

192.168.11.129 (tcp/80/www)

To disable these methods, add the following lines for each virtual
host in your configuration file :

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2


support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : \n\n------------------------------ snip


------------------------------\nTRACE /Nessus113371450.html HTTP/1.1
Connection: Close
Host: 192.168.11.129
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------\n\nand received the


following response from the remote server :\n\n------------------------------ snip
------------------------------\nHTTP/1.1 200 OK
Date: Thu, 19 Dec 2024 17:36:53 GMT
Server: Apache/2.2.8 (Ubuntu) DAV/2
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http

11213 (1) - HTTP TRACE / TRACK Methods Allowed 48


TRACE /Nessus113371450.html HTTP/1.1
Connection: Keep-Alive
Host: 192.168.11.129
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------\n

11213 (1) - HTTP TRACE / TRACK Methods Allowed 49


12085 (1) - Apache Tomcat Default Files

Synopsis

The remote web server contains default files.

Description

The default error page, default index page, example JSPs and/or example servlets are installed on the
remote Apache Tomcat server. These files should be removed as they may help an attacker uncover
information about the remote Tomcat install or host itself.

ls
See Also

ia
http://www.nessus.org/u?4cb3b4dd
https://www.owasp.org/index.php/Securing_tomcat

nt
Solution

Delete the default index page and remove the example JSP and servlets. Follow the Tomcat or OWASP
se
instructions to replace or modify the default error page.

Risk Factor
Es

Medium

CVSS v3.0 Base Score


us

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVSS v2.0 Base Score


ss

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Plugin Information
Ne

Published: 2004/03/02, Modified: 2024/09/03

Plugin Output

192.168.11.129 (tcp/8180/www)

The following default files were found :

http://192.168.11.129:8180/tomcat-docs/index.html

The server is not configured to return a custom page in the event of a client requesting a non-
existent resource.

12085 (1) - Apache Tomcat Default Files 50


This may result in a potential disclosure of sensitive information about the server to attackers.

12085 (1) - Apache Tomcat Default Files 51


12217 (1) - DNS Server Cache Snooping Remote Information Disclosure

Synopsis

The remote DNS server is vulnerable to cache snooping attacks.

Description

The remote DNS server responds to queries for third-party domains that do not have the recursion bit set.

This may allow a remote attacker to determine which domains have recently been resolved via this name
server, and therefore which hosts have been recently visited.

ls
For instance, if an attacker was interested in whether your company utilizes the online services of a
particular financial institution, they would be able to use this attack to build a statistical model regarding

ia
company usage of that financial institution. Of course, the attack can also be used to find B2B partners,
web-surfing patterns, external mail servers, and more.

Note: If this is an internal DNS server not accessible to outside networks, attacks would be limited to the

nt
internal network. This may include employees, consultants and potentially users on a guest network or
WiFi connection if supported.
se
See Also

http://cs.unc.edu/~fabian/course_papers/cache_snooping.pdf
Es

Solution

Contact the vendor of the DNS software for a fix.


us

Risk Factor

Medium
ss

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Ne

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Plugin Information

Published: 2004/04/27, Modified: 2020/04/07

Plugin Output

192.168.11.129 (udp/53/dns)

12217 (1) - DNS Server Cache Snooping Remote Information Disclosure 52


Nessus sent a non-recursive query for example.edu
and received 1 answer :

93.184.215.14

12217 (1) - DNS Server Cache Snooping Remote Information Disclosure 53


26928 (1) - SSL Weak Cipher Suites Supported

Synopsis

The remote service supports the use of weak SSL ciphers.

Description

The remote host supports the use of SSL ciphers that offer weak encryption.

Note: This is considerably easier to exploit if the attacker is on the same physical network.

ls
See Also

ia
http://www.nessus.org/u?6527892d

Solution

nt
Reconfigure the affected application, if possible to avoid the use of weak ciphers.
se
Risk Factor

Medium
Es

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
us

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
ss

References

XREF CWE:326
Ne

XREF CWE:327
XREF CWE:720
XREF CWE:753
XREF CWE:803
XREF CWE:928
XREF CWE:934

Plugin Information

Published: 2007/10/08, Modified: 2021/02/03

26928 (1) - SSL Weak Cipher Suites Supported 54


Plugin Output

192.168.11.129 (tcp/25/smtp)

Here is the list of weak SSL ciphers supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5
export
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56)
SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56)
SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

26928 (1) - SSL Weak Cipher Suites Supported 55


31705 (1) - SSL Anonymous Cipher Suites Supported

Synopsis

The remote service supports the use of anonymous SSL ciphers.

Description

The remote host supports the use of anonymous SSL ciphers. While this enables an administrator to set up
a service that encrypts traffic without having to generate and configure SSL certificates, it offers no way to
verify the remote host's identity and renders the service vulnerable to a man-in-the-middle attack.

ls
Note: This is considerably easier to exploit if the attacker is on the same physical network.

ia
See Also

http://www.nessus.org/u?3a040ada

nt
Solution

Reconfigure the affected application if possible to avoid use of weak ciphers.


se
Risk Factor
Es

Low

CVSS v3.0 Base Score


us

5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVSS v3.0 Temporal Score


ss

5.2 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score
Ne

4.4

EPSS Score

0.003

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

31705 (1) - SSL Anonymous Cipher Suites Supported 56


1.9 (CVSS2#E:U/RL:OF/RC:C)

References

BID 28482
CVE CVE-2007-1858

Plugin Information

Published: 2008/03/28, Modified: 2023/10/27

Plugin Output

192.168.11.129 (tcp/25/smtp)

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56)
SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128)
SHA1
ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256)
SHA1
ADH-RC4-MD5 0x00, 0x18 DH None RC4(128) MD5

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

31705 (1) - SSL Anonymous Cipher Suites Supported 57


33447 (1) - Multiple Vendor DNS Query ID Field Prediction Cache Poisoning

Synopsis

The remote name resolver (or the server it uses upstream) is affected by a DNS cache poisoning
vulnerability.

Description

The remote DNS resolver does not use random ports when making queries to third-party DNS servers. An
unauthenticated, remote attacker can exploit this to poison the remote DNS server, allowing the attacker to
divert legitimate traffic to arbitrary sites.

ls
See Also

ia
https://www.cnet.com/news/massive-coordinated-dns-patch-released/
https://www.theregister.co.uk/2008/07/21/dns_flaw_speculation/

Solution

nt
se
Contact your DNS server vendor for a patch.

Risk Factor
Es

Medium

CVSS v3.0 Base Score


us

6.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)

CVSS v3.0 Temporal Score


ss

6.1 (CVSS:3.0/E:P/RL:O/RC:C)

VPR Score
Ne

6.0

EPSS Score

0.2471

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

33447 (1) - Multiple Vendor DNS Query ID Field Prediction Cache Poisoning 58
3.9 (CVSS2#E:POC/RL:OF/RC:C)

STIG Severity

References

BID 30131
CVE CVE-2008-1447
XREF CERT:800113
XREF IAVA:2008-A-0045
XREF EDB-ID:6122
XREF EDB-ID:6123
XREF EDB-ID:6130

Plugin Information

Published: 2008/07/09, Modified: 2024/04/03

Plugin Output

192.168.11.129 (udp/53/dns)

The remote DNS server uses non-random ports for its


DNS requests. An attacker may spoof DNS responses.

List of used ports :

+ DNS Server: 196.74.200.22


|- Port: 60754
|- Port: 60754
|- Port: 60754
|- Port: 60754

33447 (1) - Multiple Vendor DNS Query ID Field Prediction Cache Poisoning 59
42263 (1) - Unencrypted Telnet Server

Synopsis

The remote Telnet server transmits traffic in cleartext.

Description

The remote host is running a Telnet server over an unencrypted channel.

Using Telnet over an unencrypted channel is not recommended as logins, passwords, and commands are
transferred in cleartext. This allows a remote, man-in-the-middle attacker to eavesdrop on a Telnet session

ls
to obtain credentials or other sensitive information and to modify traffic exchanged between a client and
server.

ia
SSH is preferred over Telnet since it protects credentials from eavesdropping and can tunnel additional
data streams such as an X11 session.

nt
Solution

Disable the Telnet service and use SSH instead.


se
Risk Factor

Medium
Es

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
us

CVSS v2.0 Base Score

5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
ss

Plugin Information
Ne

Published: 2009/10/27, Modified: 2024/01/16

Plugin Output

192.168.11.129 (tcp/23/telnet)

Nessus collected the following banner from the remote Telnet server :

------------------------------ snip ------------------------------


_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
|_|

42263 (1) - Unencrypted Telnet Server 60


Warning: Never expose this VM to an untrusted network!
Contact: msfdev[at]metasploit.com
Login with msfadmin/msfadmin to get started
metasploitable login:
------------------------------ snip ------------------------------

42263 (1) - Unencrypted Telnet Server 61


52611 (1) - SMTP Service STARTTLS Plaintext Command Injection

Synopsis

The remote mail service allows plaintext command injection while negotiating an encrypted
communications channel.

Description

The remote SMTP service contains a software flaw in its STARTTLS implementation that could allow a
remote, unauthenticated attacker to inject commands during the plaintext protocol phase that will be
executed during the ciphertext protocol phase.

ls
Successful exploitation could allow an attacker to steal a victim's email or associated SASL (Simple
Authentication and Security Layer) credentials.

ia
See Also

nt
https://tools.ietf.org/html/rfc2487
https://www.securityfocus.com/archive/1/516901/30/0/threaded
se
Solution

Contact the vendor to see if an update is available.


Es

Risk Factor

Medium
us

VPR Score

7.3
ss

EPSS Score
Ne

0.0135

CVSS v2.0 Base Score

4.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVSS v2.0 Temporal Score

3.1 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 46767

52611 (1) - SMTP Service STARTTLS Plaintext Command Injection 62


CVE CVE-2011-0411
CVE CVE-2011-1430
CVE CVE-2011-1431
CVE CVE-2011-1432
CVE CVE-2011-1506
CVE CVE-2011-2165
XREF CERT:555316

Plugin Information

Published: 2011/03/10, Modified: 2019/03/06

Plugin Output

192.168.11.129 (tcp/25/smtp)

Nessus sent the following two commands in a single packet :

STARTTLS\r\nRSET\r\n

And the server sent the following two responses :

220 2.0.0 Ready to start TLS


250 2.0.0 Ok

52611 (1) - SMTP Service STARTTLS Plaintext Command Injection 63


57608 (1) - SMB Signing not required

Synopsis

Signing is not required on the remote SMB server.

Description

Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to
conduct man-in-the-middle attacks against the SMB server.

ls
See Also

http://www.nessus.org/u?df39b8b3

ia
http://technet.microsoft.com/en-us/library/cc731957.aspx
http://www.nessus.org/u?74b80723

nt
https://www.samba.org/samba/docs/current/man-html/smb.conf.5.html
http://www.nessus.org/u?a3cac4ea
se
Solution

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting
'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server
Es

signing'. See the 'see also' links for further details.

Risk Factor
us

Medium

CVSS v3.0 Base Score


ss

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v3.0 Temporal Score


Ne

4.6 (CVSS:3.0/E:U/RL:O/RC:C)

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

Plugin Information

57608 (1) - SMB Signing not required 64


Published: 2012/01/19, Modified: 2022/10/05

Plugin Output

192.168.11.129 (tcp/445/cifs)

57608 (1) - SMB Signing not required 65


81606 (1) - SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)

Synopsis

The remote host supports a set of weak ciphers.

Description

The remote host supports EXPORT_RSA cipher suites with keys less than or equal to 512 bits. An attacker
can factor a 512-bit RSA modulus in a short amount of time.

A man-in-the middle attacker may be able to downgrade the session to use EXPORT_RSA cipher suites (e.g.

ls
CVE-2015-0204). Thus, it is recommended to remove support for weak cipher suites.

ia
See Also

https://www.smacktls.com/#freak

nt
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4
se
Solution

Reconfigure the service to remove support for EXPORT_RSA cipher suites.


Es

Risk Factor

Medium
us

VPR Score

3.7
ss

EPSS Score

0.9488
Ne

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

3.2 (CVSS2#E:U/RL:OF/RC:C)

References

BID 71936

81606 (1) - SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) 66
CVE CVE-2015-0204
XREF CERT:243585

Plugin Information

Published: 2015/03/04, Modified: 2021/02/03

Plugin Output

192.168.11.129 (tcp/25/smtp)

EXPORT_RSA cipher suites supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

81606 (1) - SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) 67
89058 (1) - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and
Weakened eNcryption)

Synopsis

The remote host may be affected by a vulnerability that allows a remote attacker to potentially decrypt
captured TLS traffic.

Description

The remote host supports SSLv2 and therefore may be affected by a vulnerability that allows a cross-
protocol Bleichenbacher padding oracle attack known as DROWN (Decrypting RSA with Obsolete and

ls
Weakened eNcryption). This vulnerability exists due to a flaw in the Secure Sockets Layer Version 2 (SSLv2)
implementation, and it allows captured TLS traffic to be decrypted. A man-in-the-middle attacker can
exploit this to decrypt the TLS connection by utilizing previously captured traffic and weak cryptography

ia
along with a series of specially crafted connections to an SSLv2 server that uses the same private key.

nt
See Also

https://drownattack.com/
https://drownattack.com/drown-attack-paper.pdf
se
Solution
Es

Disable SSLv2 and export grade cryptography cipher suites. Ensure that private keys are not used anywhere
with server software that supports SSLv2 connections.

Risk Factor
us

Medium

CVSS v3.0 Base Score


ss

5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
Ne

CVSS v3.0 Temporal Score

5.2 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score

3.6

EPSS Score

0.9434

89058 (1) - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened eNcryption) 68
CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.2 (CVSS2#E:U/RL:OF/RC:C)

References

BID 83733
CVE CVE-2016-0800
XREF CERT:583776

Plugin Information

Published: 2016/03/01, Modified: 2019/11/20

Plugin Output

192.168.11.129 (tcp/25/smtp)

The remote host is affected by SSL DROWN and supports the following
vulnerable cipher suites :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5
export

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 0x01, 0x00, 0x80 RSA RSA RC4(128) MD5

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

89058 (1) - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened eNcryption) 69
136808 (1) - ISC BIND Denial of Service

Synopsis

The remote name server is affected by an assertion failure vulnerability.

Description

A denial of service (DoS) vulnerability exists in ISC BIND versions 9.11.18 / 9.11.18-S1 / 9.12.4-P2 / 9.13 /
9.14.11 / 9.15 / 9.16.2 / 9.17 / 9.17.1 and earlier. An unauthenticated, remote attacker can exploit this issue,
via a specially-crafted message, to cause the service to stop responding.

ls
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported
version number.

ia
See Also

https://kb.isc.org/docs/cve-2020-8617

Solution
nt
se
Upgrade to the patched release most closely related to your current version of BIND.

Risk Factor
Es

Medium

CVSS v3.0 Base Score


us

5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVSS v3.0 Temporal Score


ss

5.3 (CVSS:3.0/E:P/RL:O/RC:C)
Ne

VPR Score

4.4

EPSS Score

0.9728

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

136808 (1) - ISC BIND Denial of Service 70


CVSS v2.0 Temporal Score

3.4 (CVSS2#E:POC/RL:OF/RC:C)

STIG Severity

References

CVE CVE-2020-8617
XREF IAVA:2020-A-0217-S

Plugin Information

Published: 2020/05/22, Modified: 2023/03/23

Plugin Output

192.168.11.129 (udp/53/dns)

Installed version : 9.4.2


Fixed version : 9.11.19

136808 (1) - ISC BIND Denial of Service 71


139915 (1) - ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS

Synopsis

The remote name server is affected by a denial of service vulnerability.

Description

According to its self-reported version number, the installation of ISC BIND running on the remote name
server is version 9.x prior to 9.11.22, 9.12.x prior to 9.16.6 or 9.17.x prior to 9.17.4. It is, therefore, affected
by a denial of service (DoS) vulnerability due to an assertion failure when attempting to verify a truncated
response to a TSIG-signed request. An authenticated, remote attacker can exploit this issue by sending a

ls
truncated response to a TSIG-signed request to trigger an assertion failure, causing the server to exit.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported

ia
version number.

See Also

nt
https://kb.isc.org/docs/cve-2020-8622
se
Solution

Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.


Es

Risk Factor

Medium
us

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
ss

CVSS v3.0 Temporal Score

5.7 (CVSS:3.0/E:U/RL:O/RC:C)
Ne

VPR Score

4.4

EPSS Score

0.004

CVSS v2.0 Base Score

4.0 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)

139915 (1) - ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS 72
CVSS v2.0 Temporal Score

3.0 (CVSS2#E:U/RL:OF/RC:C)

STIG Severity

References

CVE CVE-2020-8622
XREF IAVA:2020-A-0385-S

Plugin Information

Published: 2020/08/27, Modified: 2021/06/03

Plugin Output

192.168.11.129 (udp/53/dns)

Installed version : 9.4.2


Fixed version : 9.11.22, 9.16.6, 9.17.4 or later

139915 (1) - ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS 73
78479 (2) - SSLv3 Padding Oracle On Downgraded Legacy Encryption
Vulnerability (POODLE)

Synopsis

It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.

Description

The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as
POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.

ls
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a
victim application to repeatedly send the same data over newly created SSL 3.0 connections.

ia
As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1
or newer is supported by the client and service.

nt
The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients;
however, it can only protect connections when the client and service support the mechanism. Sites that
cannot disable SSLv3 immediately should enable this mechanism.
se
This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is
the only way to completely mitigate the vulnerability.
Es

See Also

https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
us

https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00

Solution
ss

Disable SSLv3.

Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be
Ne

disabled.

Risk Factor

Medium

CVSS v3.0 Base Score

3.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N)

CVSS v3.0 Temporal Score

3.1 (CVSS:3.0/E:P/RL:O/RC:C)

78479 (2) - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) 74
VPR Score

5.1

EPSS Score

0.9746

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.4 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 70574
CVE CVE-2014-3566
XREF CERT:577193

Plugin Information

Published: 2014/10/15, Modified: 2023/06/23

Plugin Output

192.168.11.129 (tcp/25/smtp)

Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.

It appears that TLSv1 or newer is supported on the server. However, the


Fallback SCSV mechanism is not supported, allowing connections to be "rolled
back" to SSLv3.

192.168.11.129 (tcp/5432/postgresql)

Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.

It appears that TLSv1 or newer is supported on the server. However, the


Fallback SCSV mechanism is not supported, allowing connections to be "rolled
back" to SSLv3.

78479 (2) - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) 75
10114 (1) - ICMP Timestamp Request Remote Date Disclosure

Synopsis

It is possible to determine the exact time set on the remote host.

Description

The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that
is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-
based authentication protocols.

ls
Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect,
but usually within 1000 seconds of the actual system time.

ia
Solution

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

Risk Factor

nt
se
Low

VPR Score
Es

2.2

EPSS Score
us

0.8939

CVSS v2.0 Base Score


ss

2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)

References
Ne

CVE CVE-1999-0524
XREF CWE:200

Plugin Information

Published: 1999/08/01, Modified: 2024/10/07

Plugin Output

192.168.11.129 (icmp/0)

10114 (1) - ICMP Timestamp Request Remote Date Disclosure 76


The difference between the local and remote clocks is 4835 seconds.

10114 (1) - ICMP Timestamp Request Remote Date Disclosure 77


10407 (1) - X Server Detection

Synopsis

An X11 server is listening on the remote host

Description

The remote host is running an X11 server. X11 is a client-server protocol that can be used to display
graphical applications running on a given host on a remote client.

Since the X11 traffic is not ciphered, it is possible for an attacker to eavesdrop on the connection.

ls
Solution

ia
Restrict access to this port. If the X11 client/server facility is not used, disable TCP support in X11 entirely (-
nolisten tcp).

nt
Risk Factor

Low
se
CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
Es

Plugin Information

Published: 2000/05/12, Modified: 2019/03/05


us

Plugin Output

192.168.11.129 (tcp/6000/x11)
ss

X11 Version : 11.0


Ne

10407 (1) - X Server Detection 78


83738 (1) - SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported
(Logjam)

Synopsis

The remote host supports a set of weak ciphers.

Description

The remote host supports EXPORT_DHE cipher suites with keys less than or equal to 512 bits. Through
cryptanalysis, a third party can find the shared secret in a short amount of time.

ls
A man-in-the middle attacker may be able to downgrade the session to use EXPORT_DHE cipher suites.
Thus, it is recommended to remove support for weak cipher suites.

ia
See Also

nt
https://weakdh.org/

Solution
se
Reconfigure the service to remove support for EXPORT_DHE cipher suites.

Risk Factor
Es

Low

CVSS v3.0 Base Score


us

3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v3.0 Temporal Score


ss

3.2 (CVSS:3.0/E:U/RL:O/RC:C)
Ne

VPR Score

4.5

EPSS Score

0.9698

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)

83738 (1) - SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) 79
CVSS v2.0 Temporal Score

2.2 (CVSS2#E:U/RL:ND/RC:C)

References

BID 74733
CVE CVE-2015-4000
XREF CEA-ID:CEA-2021-0004

Plugin Information

Published: 2015/05/21, Modified: 2022/12/05

Plugin Output

192.168.11.129 (tcp/25/smtp)

EXPORT_DHE cipher suites supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

83738 (1) - SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) 80
83875 (1) - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)

Synopsis

The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to
1024 bits.

Description

The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal
to 1024 bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount
of time (depending on modulus size and attacker resources). This may allow an attacker to recover the

ls
plaintext or potentially violate the integrity of connections.

ia
See Also

https://weakdh.org/

nt
Solution
se
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.

Risk Factor
Es

Low

CVSS v3.0 Base Score


us

3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v3.0 Temporal Score


ss

3.2 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score
Ne

4.5

EPSS Score

0.9698

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

83875 (1) - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) 81


1.9 (CVSS2#E:U/RL:OF/RC:C)

References

BID 74733
CVE CVE-2015-4000
XREF CEA-ID:CEA-2021-0004

Plugin Information

Published: 2015/05/28, Modified: 2024/09/11

Plugin Output

192.168.11.129 (tcp/25/smtp)

Vulnerable connection combinations :

SSL/TLS version : SSLv3


Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Diffie-Hellman MODP size (bits) : 512
Logjam attack difficulty : Easy (could be carried out by individuals)

SSL/TLS version : TLSv1.0


Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Diffie-Hellman MODP size (bits) : 512
Logjam attack difficulty : Easy (could be carried out by individuals)

83875 (1) - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) 82


11219 (25) - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the

ls
network is loaded.

ia
Solution

Protect your target with an IP filter.

nt
Risk Factor

None
se
Plugin Information

Published: 2009/02/04, Modified: 2024/05/20


Es

Plugin Output

192.168.11.129 (tcp/21/ftp)
us

Port 21/tcp was found to be open


ss

192.168.11.129 (tcp/22/ssh)

Port 22/tcp was found to be open


Ne

192.168.11.129 (tcp/23/telnet)

Port 23/tcp was found to be open

192.168.11.129 (tcp/25/smtp)

Port 25/tcp was found to be open

192.168.11.129 (tcp/53/dns)

11219 (25) - Nessus SYN scanner 83


Port 53/tcp was found to be open

192.168.11.129 (tcp/80/www)

Port 80/tcp was found to be open

192.168.11.129 (tcp/111/rpc-portmapper)

Port 111/tcp was found to be open

192.168.11.129 (tcp/139/smb)

Port 139/tcp was found to be open

192.168.11.129 (tcp/445/cifs)

Port 445/tcp was found to be open

192.168.11.129 (tcp/512)

Port 512/tcp was found to be open

192.168.11.129 (tcp/513/rlogin)

Port 513/tcp was found to be open

192.168.11.129 (tcp/514/rsh)

Port 514/tcp was found to be open

192.168.11.129 (tcp/1099/rmi_registry)

Port 1099/tcp was found to be open

192.168.11.129 (tcp/1524/wild_shell)

Port 1524/tcp was found to be open

192.168.11.129 (tcp/2049/rpc-nfs)

Port 2049/tcp was found to be open

192.168.11.129 (tcp/2121)

11219 (25) - Nessus SYN scanner 84


Port 2121/tcp was found to be open

192.168.11.129 (tcp/3306/mysql)

Port 3306/tcp was found to be open

192.168.11.129 (tcp/3632)

Port 3632/tcp was found to be open

192.168.11.129 (tcp/5432/postgresql)

Port 5432/tcp was found to be open

192.168.11.129 (tcp/5900/vnc)

Port 5900/tcp was found to be open

192.168.11.129 (tcp/6000/x11)

Port 6000/tcp was found to be open

192.168.11.129 (tcp/6667/irc)

Port 6667/tcp was found to be open

192.168.11.129 (tcp/8009/ajp13)

Port 8009/tcp was found to be open

192.168.11.129 (tcp/8180/www)

Port 8180/tcp was found to be open

192.168.11.129 (tcp/8787)

Port 8787/tcp was found to be open

11219 (25) - Nessus SYN scanner 85


11111 (10) - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

ls
Solution

ia
n/a

Risk Factor

nt
None se
Plugin Information

Published: 2002/08/24, Modified: 2011/05/24


Es

Plugin Output

192.168.11.129 (tcp/111/rpc-portmapper)
us

The following RPC services are available on TCP port 111 :

- program: 100000 (portmapper), version: 2


ss

192.168.11.129 (udp/111/rpc-portmapper)
Ne

The following RPC services are available on UDP port 111 :

- program: 100000 (portmapper), version: 2

192.168.11.129 (tcp/2049/rpc-nfs)

The following RPC services are available on TCP port 2049 :

- program: 100003 (nfs), version: 2


- program: 100003 (nfs), version: 3
- program: 100003 (nfs), version: 4

192.168.11.129 (udp/2049/rpc-nfs)

11111 (10) - RPC Services Enumeration 86


The following RPC services are available on UDP port 2049 :

- program: 100003 (nfs), version: 2


- program: 100003 (nfs), version: 3
- program: 100003 (nfs), version: 4

192.168.11.129 (udp/35902/rpc-nlockmgr)

The following RPC services are available on UDP port 35902 :

- program: 100021 (nlockmgr), version: 1


- program: 100021 (nlockmgr), version: 3
- program: 100021 (nlockmgr), version: 4

192.168.11.129 (udp/35990/rpc-mountd)

The following RPC services are available on UDP port 35990 :

- program: 100005 (mountd), version: 1


- program: 100005 (mountd), version: 2
- program: 100005 (mountd), version: 3

192.168.11.129 (tcp/38053/rpc-mountd)

The following RPC services are available on TCP port 38053 :

- program: 100005 (mountd), version: 1


- program: 100005 (mountd), version: 2
- program: 100005 (mountd), version: 3

192.168.11.129 (tcp/39032/rpc-nlockmgr)

The following RPC services are available on TCP port 39032 :

- program: 100021 (nlockmgr), version: 1


- program: 100021 (nlockmgr), version: 3
- program: 100021 (nlockmgr), version: 4

192.168.11.129 (udp/58444/rpc-status)

The following RPC services are available on UDP port 58444 :

- program: 100024 (status), version: 1

192.168.11.129 (tcp/60280/rpc-status)

The following RPC services are available on TCP port 60280 :

11111 (10) - RPC Services Enumeration 87


- program: 100024 (status), version: 1

11111 (10) - RPC Services Enumeration 88


22964 (8) - Service Detection

Synopsis

The remote service could be identified.

Description

Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

ls
Solution

n/a

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2007/08/19, Modified: 2024/03/26

Plugin Output
Es

192.168.11.129 (tcp/21/ftp)

An FTP server is running on this port.


us

192.168.11.129 (tcp/22/ssh)
ss

An SSH server is running on this port.

192.168.11.129 (tcp/23/telnet)
Ne

A telnet server is running on this port.

192.168.11.129 (tcp/25/smtp)

An SMTP server is running on this port.

192.168.11.129 (tcp/80/www)

A web server is running on this port.

22964 (8) - Service Detection 89


192.168.11.129 (tcp/1524/wild_shell)

A shell server (Metasploitable) is running on this port.

192.168.11.129 (tcp/5900/vnc)

A vnc server is running on this port.

192.168.11.129 (tcp/8180/www)

A web server is running on this port.

22964 (8) - Service Detection 90


10107 (2) - HTTP Server Type and Version

Synopsis

A web server is running on the remote host.

Description

This plugin attempts to determine the type and the version of the remote web server.

Solution

ls
n/a

ia
Risk Factor

None

nt
References
se
XREF IAVT:0001-T-0931

Plugin Information
Es

Published: 2000/01/04, Modified: 2020/10/30

Plugin Output
us

192.168.11.129 (tcp/80/www)

The remote web server type is :


ss

Apache/2.2.8 (Ubuntu) DAV/2

192.168.11.129 (tcp/8180/www)
Ne

The remote web server type is :

Apache-Coyote/1.1

10107 (2) - HTTP Server Type and Version 91


10863 (2) - SSL Certificate Information

Synopsis

This plugin displays the SSL certificate.

Description

This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.

Solution

ls
n/a

ia
Risk Factor

None

nt
Plugin Information
se
Published: 2008/05/19, Modified: 2021/02/03

Plugin Output
Es

192.168.11.129 (tcp/25/smtp)

Subject Name:

Country: XX
us

State/Province: There is no such thing outside US


Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
ss

Email Address: root@ubuntu804-base.localdomain

Issuer Name:
Ne

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT


Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

10863 (2) - SSL Certificate Information 92


Algorithm: RSA Encryption
Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits


Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

Fingerprints :

SHA-256 Fingerprint: E7 A7 FA 0D 63 E4 57 C7 C4 A5 9B 38 B7 08 49 C6 A7 0B DA 6F
83 0C 7A F1 E3 2D EE 43 6D E8 13 CC
SHA-1 Fingerprint: ED 09 30 88 70 66 03 BF D5 DC 23 73 99 B4 98 DA 2D [...]

192.168.11.129 (tcp/5432/postgresql)

Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT


Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption


Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5

10863 (2) - SSL Certificate Information 93


Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits


Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

Fingerprints :

SHA-256 Fingerprint: E7 A7 FA 0D 63 E4 57 C7 C4 A5 9B 38 B7 08 49 C6 A7 0B DA 6F
83 0C 7A F1 E3 2D EE 43 6D E8 13 CC
SHA-1 Fingerprint: ED 09 30 88 70 66 03 BF D5 DC 23 73 99 B4 98 DA 2D [...]

10863 (2) - SSL Certificate Information 94


11002 (2) - DNS Server Detection

Synopsis

A DNS server is listening on the remote host.

Description

The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames
and IP addresses.

ls
See Also

https://en.wikipedia.org/wiki/Domain_Name_System

ia
Solution

nt
Disable this service if it is not needed or restrict access to internal hosts only if the service is available
externally. se
Risk Factor

None
Es

Plugin Information

Published: 2003/02/13, Modified: 2017/05/16


us

Plugin Output

192.168.11.129 (tcp/53/dns)
192.168.11.129 (udp/53/dns)
ss
Ne

11002 (2) - DNS Server Detection 95


11011 (2) - Microsoft Windows SMB Service Detection

Synopsis

A file / print sharing service is listening on the remote host.

Description

The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB)
protocol, used to provide shared access to files, printers, etc between nodes on a network.

ls
Solution

n/a

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2002/06/05, Modified: 2021/02/11

Plugin Output
Es

192.168.11.129 (tcp/139/smb)
us

An SMB server is running on this port.

192.168.11.129 (tcp/445/cifs)
ss

A CIFS server is running on this port.


Ne

11011 (2) - Microsoft Windows SMB Service Detection 96


11154 (2) - Unknown Service Detection: Banner Retrieval

Synopsis

There is an unknown service running on the remote host.

Description

Nessus was unable to identify a service on the remote host even though it returned a banner of some type.

Solution

ls
n/a

ia
Risk Factor

None

nt
Plugin Information
se
Published: 2002/11/18, Modified: 2022/07/26

Plugin Output
Es

192.168.11.129 (tcp/512)

If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
us

following output to svc-signatures@nessus.org :

Port : 512
Type : spontaneous
Banner :
ss

0x00: 01 57 68 65 72 65 20 61 72 65 20 79 6F 75 3F 0A .Where are you?.


0x10:
Ne

192.168.11.129 (tcp/8787)

If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :

Port : 8787
Type : get_http
Banner :
0x0000: 00 00 00 03 04 08 46 00 00 03 A1 04 08 6F 3A 16 ......F......o:.
0x0010: 44 52 62 3A 3A 44 52 62 43 6F 6E 6E 45 72 72 6F DRb::DRbConnErro
0x0020: 72 07 3A 07 62 74 5B 17 22 2F 2F 75 73 72 2F 6C r.:.bt[."//usr/l
0x0030: 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F ib/ruby/1.8/drb/
0x0040: 64 72 62 2E 72 62 3A 35 37 33 3A 69 6E 20 60 6C drb.rb:573:in `l
0x0050: 6F 61 64 27 22 37 2F 75 73 72 2F 6C 69 62 2F 72 oad'"7/usr/lib/r

11154 (2) - Unknown Service Detection: Banner Retrieval 97


0x0060: 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 2E uby/1.8/drb/drb.
0x0070: 72 62 3A 36 31 32 3A 69 6E 20 60 72 65 63 76 5F rb:612:in `recv_
0x0080: 72 65 71 75 65 73 74 27 22 37 2F 75 73 72 2F 6C request'"7/usr/l
0x0090: 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F ib/ruby/1.8/drb/
0x00A0: 64 72 62 2E 72 62 3A 39 31 31 3A 69 6E 20 60 72 drb.rb:911:in `r
0x00B0: 65 63 76 5F 72 65 71 75 65 73 74 27 22 3C 2F 75 ecv_request'"</u
0x00C0: 73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F sr/lib/ruby/1.8/
0x00D0: 64 72 62 2F 64 72 62 2E 72 62 3A 31 35 33 30 3A drb/drb.rb:1530:
0x00E0: 69 6E 20 60 69 6E 69 74 5F 77 69 74 68 5F 63 6C in `init_with_cl
0x00F0: 69 65 6E 74 27 22 39 2F 75 73 72 2F 6C 69 62 2F ient'"9/usr/lib/
0x0100: 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 ruby/1.8/drb/drb
0x0110: 2E 72 62 3A 31 35 34 32 3A 69 6E 20 60 73 65 74 .rb:1542:in `set
0x0120: 75 70 5F 6D 65 73 73 61 67 65 27 22 33 2F 75 73 up_message'"3/us
0x0130: 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 r/lib/ruby/1.8/d
0x0140: 72 62 2F 64 72 62 2E 72 62 3A 31 34 39 34 [...]

11154 (2) - Unknown Service Detection: Banner Retrieval 98


21643 (2) - SSL Cipher Suites Supported

Synopsis

The remote service encrypts communications using SSL.

Description

This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.

See Also

ls
https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced

ia
Solution

nt
n/a se
Risk Factor

None
Es

Plugin Information

Published: 2006/06/05, Modified: 2024/09/11


us

Plugin Output

192.168.11.129 (tcp/25/smtp)
ss

Here is the list of SSL ciphers supported by the remote server :


Each group is reported per SSL Version.
Ne

SSL Version : TLSv1


Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56)
SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56)
SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export

21643 (2) - SSL Cipher Suites Supported 99


EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth [...]

192.168.11.129 (tcp/5432/postgresql)

Here is the list of SSL ciphers supported by the remote server :


Each group is reported per SSL Version.

SSL Version : TLSv1


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128)
SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256)
SHA1
RC4-SHA 0x00, 0x05 RSA RSA RC4(128)
SHA1

SSL Version : SSLv3


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- [...]

21643 (2) - SSL Cipher Suites Supported 100


22227 (2) - RMI Registry Detection

Synopsis

An RMI registry is listening on the remote host.

Description

The remote host is running an RMI registry, which acts as a bootstrap naming service for registering and
retrieving remote objects with simple names in the Java Remote Method Invocation (RMI) system.

ls
See Also

https://docs.oracle.com/javase/1.5.0/docs/guide/rmi/spec/rmiTOC.html

ia
http://www.nessus.org/u?b6fd7659

nt
Solution

n/a
se
Risk Factor

None
Es

Plugin Information

Published: 2006/08/16, Modified: 2022/06/01


us

Plugin Output

192.168.11.129 (tcp/1099/rmi_registry)
192.168.11.129 (tcp/1099/rmi_registry)
ss

Valid response recieved for port 1099:


0x00: 51 AC ED 00 05 77 0F 01 53 81 86 06 00 00 01 93 Q....w..S.......
Ne

0x10: DF FF B9 7B 80 02 75 72 00 13 5B 4C 6A 61 76 61 ...{..ur..[Ljava
0x20: 2E 6C 61 6E 67 2E 53 74 72 69 6E 67 3B AD D2 56 .lang.String;..V
0x30: E7 E9 1D 7B 47 02 00 00 70 78 70 00 00 00 00 ...{G...pxp....

22227 (2) - RMI Registry Detection 101


24260 (2) - HyperText Transfer Protocol (HTTP) Information

Synopsis

Some information about the remote HTTP configuration can be extracted.

Description

This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-
Alive is enabled, etc...

This test is informational only and does not denote any security problem.

ls
Solution

ia
n/a

nt
Risk Factor

None
se
Plugin Information

Published: 2007/01/30, Modified: 2024/02/26


Es

Plugin Output

192.168.11.129 (tcp/80/www)
us

Response Code : HTTP/1.1 200 OK

Protocol version : HTTP/1.1


ss

HTTP/2 TLS Support: No


HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : yes
Options allowed : (Not implemented)
Ne

Headers :

Date: Thu, 19 Dec 2024 17:37:34 GMT


Server: Apache/2.2.8 (Ubuntu) DAV/2
X-Powered-By: PHP/5.2.4-2ubuntu5.10
Content-Length: 891
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

Response Body :

<html><head><title>Metasploitable2 - Linux</title></head><body>
<pre>

_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |

24260 (2) - HyperText Transfer Protocol (HTTP) Information 102


| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
|_|

Warning: Never expose this VM to an untrusted network!

Contact: msfdev[at]metasploit.com

Login with msfadmin/msfadmin to get started

</pre>
<ul>
<li><a href="/twiki/">TWiki</a></li>
<li><a href="/phpMyAdmin/">phpMyAdmin</a></li>
<li><a href="/mutillidae/">Mutillidae</a></li>
<li><a href="/dvwa/">DVWA</a></li>
<li><a href="/dav/">WebDAV</a></li>
</ul>
</body>
</html>

192.168.11.129 (tcp/8180/www)

Response Code : HTTP/1.1 200 OK

Protocol version : HTTP/1.1


HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : GET, HEAD, POST, PUT, DELETE, TRACE, OPTIONS
Headers :

Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Date: Thu, 19 Dec 2024 17:37:29 GMT
Connection: close

Response Body :

<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software


distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">


<head>
<title>Apache Tomcat/5.5</title>
<style type="text/css">

24260 (2) - HyperText Transfer Protocol (HTTP) Information 103


/*<![CDATA[*/
body {
color: #000000;
background-color: #FFFFFF;
font-family: Arial, "Times New Roman", Times, serif;
margin: 10px 0px;
}

img {
border: none;
}

a:link, a:visited {
color: blue
}

th {
font-family: Verdana, "Times New Roman", Times, serif;
font-size: 110%;
font-weight: normal;
font-style: italic;
background: #D2A41C;
text-align: left;
}

td {
color: #000000;
font-family: Arial, Helvetica, sans-serif;
}

td.men [...]

24260 (2) - HyperText Transfer Protocol (HTTP) Information 104


45410 (2) - SSL Certificate 'commonName' Mismatch

Synopsis

The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.

Description

The service running on the remote host presents an SSL certificate for which the 'commonName' (CN)
attribute does not match the hostname on which the service listens.

ls
Solution

If the machine has several names, make sure that users connect to the service through the DNS hostname

ia
that matches the common name in the certificate.

Risk Factor

nt
None se
Plugin Information

Published: 2010/04/03, Modified: 2021/03/09


Es

Plugin Output

192.168.11.129 (tcp/25/smtp)
us

The host name known by Nessus is :

metasploitable
ss

The Common Name in the certificate is :

ubuntu804-base.localdomain
Ne

192.168.11.129 (tcp/5432/postgresql)

The host name known by Nessus is :

metasploitable

The Common Name in the certificate is :

ubuntu804-base.localdomain

45410 (2) - SSL Certificate 'commonName' Mismatch 105


50845 (2) - OpenSSL Detection

Synopsis

The remote service appears to use OpenSSL to encrypt traffic.

Description

Based on its response to a TLS request with a specially crafted server name extension, it seems that the
remote service is using the OpenSSL library to encrypt traffic.

Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS

ls
extensions (RFC 4366).

ia
See Also

https://www.openssl.org/

nt
Solution

n/a
se
Risk Factor
Es

None

Plugin Information
us

Published: 2010/11/30, Modified: 2020/06/12

Plugin Output
ss

192.168.11.129 (tcp/25/smtp)
192.168.11.129 (tcp/5432/postgresql)
Ne

50845 (2) - OpenSSL Detection 106


56984 (2) - SSL / TLS Versions Supported

Synopsis

The remote service encrypts communications.

Description

This plugin detects which SSL and TLS versions are supported by the remote service for encrypting
communications.

ls
Solution

n/a

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2011/12/01, Modified: 2023/07/10

Plugin Output
Es

192.168.11.129 (tcp/25/smtp)
us

This port supports SSLv2/SSLv3/TLSv1.0.

192.168.11.129 (tcp/5432/postgresql)
ss

This port supports SSLv3/TLSv1.0.


Ne

56984 (2) - SSL / TLS Versions Supported 107


57041 (2) - SSL Perfect Forward Secrecy Cipher Suites Supported

Synopsis

The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality
even if the key is stolen.

Description

The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These
cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is
compromised.

ls
See Also

ia
https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange

nt
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
se
Solution

n/a
Es

Risk Factor

None
us

Plugin Information

Published: 2011/12/07, Modified: 2021/03/09


ss

Plugin Output

192.168.11.129 (tcp/25/smtp)
Ne

Here is the list of SSL PFS ciphers supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56)
SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---

57041 (2) - SSL Perfect Forward Secrecy Cipher Suites Supported 108
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.11.129 (tcp/5432/postgresql)

Here is the list of SSL PFS ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

57041 (2) - SSL Perfect Forward Secrecy Cipher Suites Supported 109
62563 (2) - SSL Compression Methods Supported

Synopsis

The remote service supports one or more compression methods for SSL connections.

Description

This script detects which compression methods are supported by the remote service for SSL connections.

See Also

ls
http://www.iana.org/assignments/comp-meth-ids/comp-meth-ids.xml
https://tools.ietf.org/html/rfc3749

ia
https://tools.ietf.org/html/rfc3943
https://tools.ietf.org/html/rfc5246

Solution

nt
se
n/a

Risk Factor
Es

None

Plugin Information
us

Published: 2012/10/16, Modified: 2022/04/11

Plugin Output
ss

192.168.11.129 (tcp/25/smtp)
Ne

Nessus was able to confirm that the following compression method is


supported by the target :

DEFLATE (0x01)

192.168.11.129 (tcp/5432/postgresql)

Nessus was able to confirm that the following compression method is


supported by the target :

DEFLATE (0x01)

62563 (2) - SSL Compression Methods Supported 110


70544 (2) - SSL Cipher Block Chaining Cipher Suites Supported

Synopsis

The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks
with subsequent ones.

Description

The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These
cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak
information if used improperly.

ls
See Also

ia
https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a

nt
https://www.openssl.org/~bodo/tls-cbc.txt
se
Solution

n/a
Es

Risk Factor

None
us

Plugin Information

Published: 2013/10/22, Modified: 2021/02/03


ss

Plugin Output

192.168.11.129 (tcp/25/smtp)
Ne

Here is the list of SSL CBC ciphers supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56)
SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56)
SHA1

70544 (2) - SSL Cipher Block Chaining Cipher Suites Supported 111
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 0x07, 0x00, 0xC0 RSA RSA 3DES-CBC(168) MD5
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ------- [...]

192.168.11.129 (tcp/5432/postgresql)

Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128)
SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

70544 (2) - SSL Cipher Block Chaining Cipher Suites Supported 112
156899 (2) - SSL/TLS Recommended Cipher Suites

Synopsis

The remote host advertises discouraged SSL/TLS ciphers.

Description

The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to
only enable support for the following cipher suites:

TLSv1.3:

ls
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384

ia
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256

TLSv1.2:

nt
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
se
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
Es

This is the recommended configuration for the vast majority of services, as it is highly secure and
compatible with nearly every client released in the last five (or more) years.
us

See Also

https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/
ss

Solution
Ne

Only enable support for recommened cipher suites.

Risk Factor

None

Plugin Information

Published: 2022/01/20, Modified: 2024/02/12

Plugin Output

156899 (2) - SSL/TLS Recommended Cipher Suites 113


192.168.11.129 (tcp/25/smtp)

The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined
below:

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5
export
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56)
SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56)
SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 0x07, 0x00, 0xC0 RSA RSA 3DES-CBC(168) MD5
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
ADH-DE [...]

192.168.11.129 (tcp/5432/postgresql)

The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined
below:

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1

156899 (2) - SSL/TLS Recommended Cipher Suites 114


AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128)
SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256)
SHA1
RC4-SHA 0x00, 0x05 RSA RSA RC4(128)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

156899 (2) - SSL/TLS Recommended Cipher Suites 115


10028 (1) - DNS Server BIND version Directive Remote Version Detection

Synopsis

It is possible to obtain the version number of the remote DNS server.

Description

The remote host is running BIND or another DNS server that reports its version number when it receives a
special request for the text 'version.bind' in the domain 'chaos'.

This version is not necessarily accurate and could even be forged, as some DNS servers send the

ls
information based on a configuration file.

ia
Solution

It is possible to hide the version number of BIND by using the 'version' directive in the 'options' section in
named.conf.

Risk Factor

nt
se
None

References
Es

XREF IAVT:0001-T-0583

Plugin Information
us

Published: 1999/10/12, Modified: 2022/10/12

Plugin Output
ss

192.168.11.129 (udp/53/dns)
Ne

Version : 9.4.2

10028 (1) - DNS Server BIND version Directive Remote Version Detection 116
10092 (1) - FTP Server Detection

Synopsis

An FTP server is listening on a remote port.

Description

It is possible to obtain the banner of the remote FTP server by connecting to a remote port.

Solution

ls
n/a

ia
Risk Factor

None

nt
References
se
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0943
Es

Plugin Information

Published: 1999/10/12, Modified: 2023/08/17

Plugin Output
us

192.168.11.129 (tcp/21/ftp)
ss

The remote FTP banner is :

220 (vsFTPd 2.3.4)


Ne

10092 (1) - FTP Server Detection 117


10150 (1) - Windows NetBIOS / SMB Remote Host Information Disclosure

Synopsis

It was possible to obtain the network name of the remote host.

Description

The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB
requests.

Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.

ls
Solution

ia
n/a

nt
Risk Factor

None
se
Plugin Information

Published: 1999/10/12, Modified: 2021/02/10


Es

Plugin Output

192.168.11.129 (udp/137/netbios-ns)
us

The following 7 NetBIOS names have been gathered :

METASPLOITABLE = Computer name


METASPLOITABLE = Messenger Service
ss

METASPLOITABLE = File Server Service


__MSBROWSE__ = Master Browser
WORKGROUP = Workgroup / Domain name
WORKGROUP = Master Browser
WORKGROUP = Browser Service Elections
Ne

This SMB server seems to be a Samba server - its MAC address is NULL.

10150 (1) - Windows NetBIOS / SMB Remote Host Information Disclosure 118
10223 (1) - RPC portmapper Service Detection

Synopsis

An ONC RPC portmapper is running on the remote host.

Description

The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host
by sending either multiple lookup requests or a DUMP request.

ls
Solution

ia
n/a

nt
Risk Factor

None
se
CVSS v3.0 Base Score

0.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)
Es

CVSS v2.0 Base Score

0.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:N)
us

References

CVE CVE-1999-0632
ss

Plugin Information
Ne

Published: 1999/08/19, Modified: 2019/10/04

Plugin Output

192.168.11.129 (udp/111/rpc-portmapper)

10223 (1) - RPC portmapper Service Detection 119


10263 (1) - SMTP Server Detection

Synopsis

An SMTP server is listening on the remote port.

Description

The remote host is running a mail (SMTP) server on this port.

Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it.

ls
Solution

ia
Disable this service if you do not use it, or filter incoming traffic to this port.

Risk Factor

nt
None se
References

XREF IAVT:0001-T-0932
Es

Plugin Information

Published: 1999/10/12, Modified: 2020/09/22


us

Plugin Output

192.168.11.129 (tcp/25/smtp)
ss

Remote SMTP server banner :

220 metasploitable.localdomain ESMTP Postfix (Ubuntu)


Ne

10263 (1) - SMTP Server Detection 120


10267 (1) - SSH Server Type and Version Information

Synopsis

An SSH server is listening on this port.

Description

It is possible to obtain information about the remote SSH server by sending an empty authentication
request.

ls
Solution

n/a

ia
Risk Factor

nt
None

References
se
XREF IAVT:0001-T-0933
Es

Plugin Information

Published: 1999/10/12, Modified: 2024/07/24

Plugin Output
us

192.168.11.129 (tcp/22/ssh)
ss

SSH version : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1


SSH supported authentication : publickey,password
Ne

10267 (1) - SSH Server Type and Version Information 121


10281 (1) - Telnet Server Detection

Synopsis

A Telnet server is listening on the remote port.

Description

The remote host is running a Telnet server, a remote terminal server.

Solution

ls
Disable this service if you do not use it.

ia
Risk Factor

None

nt
Plugin Information
se
Published: 1999/10/12, Modified: 2020/06/12

Plugin Output
Es

192.168.11.129 (tcp/23/telnet)

Here is the banner from the remote Telnet server :

------------------------------ snip ------------------------------


us

_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
ss

|_|
Warning: Never expose this VM to an untrusted network!
Contact: msfdev[at]metasploit.com
Login with msfadmin/msfadmin to get started
Ne

metasploitable login:
------------------------------ snip ------------------------------

10281 (1) - Telnet Server Detection 122


10287 (1) - Traceroute Information

Synopsis

It was possible to obtain traceroute information.

Description

Makes a traceroute to the remote host.

Solution

ls
n/a

ia
Risk Factor

None

nt
Plugin Information
se
Published: 1999/11/27, Modified: 2023/12/04

Plugin Output
Es

192.168.11.129 (udp/0)

For your information, here is the traceroute from 192.168.11.1 to 192.168.11.129 :


192.168.11.1
192.168.11.129
us

Hop Count: 1
ss
Ne

10287 (1) - Traceroute Information 123


10342 (1) - VNC Software Detection

Synopsis

The remote host is running a remote display software (VNC).

Description

The remote host is running VNC (Virtual Network Computing), which uses the RFB (Remote Framebuffer)
protocol to provide remote access to graphical user interfaces and thus permits a console on the remote
host to be displayed on another.

ls
See Also

ia
https://en.wikipedia.org/wiki/Vnc

nt
Solution

Make sure use of this software is done in accordance with your organization's security policy and filter
incoming traffic to this port.
se
Risk Factor

None
Es

Plugin Information

Published: 2000/03/07, Modified: 2017/06/12


us

Plugin Output

192.168.11.129 (tcp/5900/vnc)
ss

The highest RFB protocol version supported by the server is :


Ne

3.3

10342 (1) - VNC Software Detection 124


10397 (1) - Microsoft Windows SMB LanMan Pipe Server Listing Disclosure

Synopsis

It is possible to obtain network information.

Description

It was possible to obtain the browse list of the remote Windows system by sending a request to the
LANMAN pipe. The browse list is the list of the nearest Windows systems of the remote host.

ls
Solution

n/a

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2000/05/09, Modified: 2022/02/01

Plugin Output
Es

192.168.11.129 (tcp/445/cifs)
us

Here is the browse list of the remote host :

DESKTOP-V3A2KBR ( os : 0.0 )
METASPLOITABLE ( os : 0.0 )
ss
Ne

10397 (1) - Microsoft Windows SMB LanMan Pipe Server Listing Disclosure 125
10437 (1) - NFS Share Export List

Synopsis

The remote NFS server exports a list of shares.

Description

This plugin retrieves the list of NFS exported shares.

See Also

ls
http://www.tldp.org/HOWTO/NFS-HOWTO/security.html

ia
Solution

Ensure each share is intended to be exported.

Risk Factor

nt
se
None

Plugin Information
Es

Published: 2000/06/07, Modified: 2019/10/04

Plugin Output
us

192.168.11.129 (tcp/2049/rpc-nfs)

Here is the export list of 192.168.11.129 :


ss

/ *
Ne

10437 (1) - NFS Share Export List 126


10719 (1) - MySQL Server Detection

Synopsis

A database server is listening on the remote port.

Description

The remote host is running MySQL, an open source database server.

Solution

ls
n/a

ia
Risk Factor

None

nt
References
se
XREF IAVT:0001-T-0802

Plugin Information
Es

Published: 2001/08/13, Modified: 2022/10/12

Plugin Output
us

192.168.11.129 (tcp/3306/mysql)

Version : 5.0.51a-3ubuntu5
ss

Protocol : 10
Server Status : SERVER_STATUS_AUTOCOMMIT
Server Capabilities :
CLIENT_LONG_FLAG (Get all column flags)
Ne

CLIENT_CONNECT_WITH_DB (One can specify db on connect)


CLIENT_COMPRESS (Can use compression protocol)
CLIENT_PROTOCOL_41 (New 4.1 protocol)
CLIENT_SSL (Switch to SSL after handshake)
CLIENT_TRANSACTIONS (Client knows about transactions)
CLIENT_SECURE_CONNECTION (New 4.1 authentication)

10719 (1) - MySQL Server Detection 127


10785 (1) - Microsoft Windows SMB NativeLanManager Remote System
Information Disclosure

Synopsis

It was possible to obtain information about the remote operating system.

Description

Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by
sending an authentication request to port 139 or 445. Note that this plugin requires SMB to be enabled on
the host.

ls
Solution

ia
n/a

nt
Risk Factor

None
se
Plugin Information

Published: 2001/10/17, Modified: 2021/09/20


Es

Plugin Output

192.168.11.129 (tcp/445/cifs)
us

The remote Operating System is : Unix


The remote native LAN manager is : Samba 3.0.20-Debian
The remote SMB Domain Name is : METASPLOITABLE
ss
Ne

10785 (1) - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure 128
10881 (1) - SSH Protocol Versions Supported

Synopsis

A SSH server is running on the remote host.

Description

This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.

Solution

ls
n/a

ia
Risk Factor

None

nt
Plugin Information
se
Published: 2002/03/06, Modified: 2024/07/24

Plugin Output
Es

192.168.11.129 (tcp/22/ssh)

The remote SSH daemon supports the following versions of the


SSH protocol :
us

- 1.99
- 2.0
ss
Ne

10881 (1) - SSH Protocol Versions Supported 129


11153 (1) - Service Detection (HELP Request)

Synopsis

The remote service could be identified.

Description

It was possible to identify the remote service by its banner or by looking at the error message it sends
when it receives a 'HELP'
request.

ls
Solution

ia
n/a

nt
Risk Factor

None se
Plugin Information

Published: 2002/11/18, Modified: 2024/11/19


Es

Plugin Output

192.168.11.129 (tcp/3306/mysql)
us

A MySQL server is running on this port.


ss
Ne

11153 (1) - Service Detection (HELP Request) 130


11156 (1) - IRC Daemon Version Detection

Synopsis

The remote host is an IRC server.

Description

This plugin determines the version of the IRC daemon.

Solution

ls
n/a

ia
Risk Factor

None

nt
Plugin Information
se
Published: 2002/11/19, Modified: 2016/01/08

Plugin Output
Es

192.168.11.129 (tcp/6667/irc)

The IRC server version is : Unreal3.2.8.1. FhiXOoE [*=2309]


us
ss
Ne

11156 (1) - IRC Daemon Version Detection 131


11422 (1) - Web Server Unconfigured - Default Install Page Present

Synopsis

The remote web server is not configured or is improperly configured.

Description

The remote web server uses its default welcome page. Therefore, it's probable that this server is not used
at all or is serving content that is meant to be hidden.

ls
Solution

Disable this service if you do not use it.

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2003/03/20, Modified: 2018/08/15

Plugin Output
Es

192.168.11.129 (tcp/8180/www)
us

The default welcome page is from Tomcat.


ss
Ne

11422 (1) - Web Server Unconfigured - Default Install Page Present 132
11424 (1) - WebDAV Detection

Synopsis

The remote server is running with WebDAV enabled.

Description

WebDAV is an industry standard extension to the HTTP specification.


It adds a capability for authorized users to remotely add and manage the content of a web server.

ls
If you do not use this extension, you should disable it.

Solution

ia
http://support.microsoft.com/default.aspx?kbid=241520

nt
Risk Factor

None
se
Plugin Information

Published: 2003/03/20, Modified: 2011/03/14


Es

Plugin Output

192.168.11.129 (tcp/80/www)
us
ss
Ne

11424 (1) - WebDAV Detection 133


11819 (1) - TFTP Daemon Detection

Synopsis

A TFTP server is listening on the remote port.

Description

The remote host is running a TFTP (Trivial File Transfer Protocol) daemon. TFTP is often used by routers and
diskless hosts to retrieve their configuration. It can also be used by worms to propagate.

ls
Solution

Disable this service if you do not use it.

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2003/08/13, Modified: 2022/12/28

Plugin Output
Es

192.168.11.129 (udp/69/tftp)
us
ss
Ne

11819 (1) - TFTP Daemon Detection 134


11936 (1) - OS Identification

Synopsis

It is possible to guess the remote operating system.

Description

Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess
the name of the remote operating system in use. It is also possible sometimes to guess the version of the
operating system.

ls
Solution

ia
n/a

Risk Factor

nt
None se
Plugin Information

Published: 2003/12/09, Modified: 2024/10/14


Es

Plugin Output

192.168.11.129 (tcp/0)
us

Remote operating system : Linux Kernel 2.6 on Ubuntu 8.04 (gutsy)


Confidence level : 95
Method : HTTP
ss

Not all fingerprints could give a match. If you think that these
signatures would help us improve OS fingerprinting, please submit
them by visiting https://www.tenable.com/research/submitsignatures.

SSH:SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
Ne

SinFP:
P1:B10113:F0x12:W5840:O0204ffff:M1460:
P2:B10113:F0x12:W5792:O0204ffff0402080affffffff4445414401030305:M1460:
P3:B00000:F0x00:W0:O0:M0
P4:191003_7_p=2121
SMTP:!:220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
SSLcert:!:i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple
Affairss/CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple
Affairs
ed093088706603bfd5dc237399b498da2d4d31c6
i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple Affairss/
CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple Affairs
ed093088706603bfd5dc237399b498da2d4d31c6

The remote host is running Linux Kernel 2.6 on Ubuntu 8.04 (gutsy)

11936 (1) - OS Identification 135


17975 (1) - Service Detection (GET request)

Synopsis

The remote service could be identified.

Description

It was possible to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

ls
Solution

n/a

ia
Risk Factor

nt
None

References
se
XREF IAVT:0001-T-0935
Es

Plugin Information

Published: 2005/04/06, Modified: 2021/10/27

Plugin Output
us

192.168.11.129 (tcp/6667/irc)

An IRC daemon is listening on this port.


ss
Ne

17975 (1) - Service Detection (GET request) 136


18261 (1) - Apache Banner Linux Distribution Disclosure

Synopsis

The name of the Linux distribution running on the remote host was found in the banner of the web server.

Description

Nessus was able to extract the banner of the Apache web server and determine which Linux distribution
the remote host is running.

ls
Solution

If you do not wish to display this information, edit 'httpd.conf' and set the directive 'ServerTokens Prod' and

ia
restart Apache.

Risk Factor

nt
None se
Plugin Information

Published: 2005/05/15, Modified: 2022/03/21


Es

Plugin Output

192.168.11.129 (tcp/0)
us

The Linux distribution detected was :


- Ubuntu 8.04 (gutsy)
ss
Ne

18261 (1) - Apache Banner Linux Distribution Disclosure 137


19288 (1) - VNC Server Security Type Detection

Synopsis

A VNC server is running on the remote host.

Description

This script checks the remote VNC server protocol version and the available 'security types'.

Solution

ls
n/a

ia
Risk Factor

None

nt
Plugin Information
se
Published: 2005/07/22, Modified: 2021/07/13

Plugin Output
Es

192.168.11.129 (tcp/5900/vnc)

\nThe remote VNC server chose security type #2 (VNC authentication)


us
ss
Ne

19288 (1) - VNC Server Security Type Detection 138


19506 (1) - Nessus Scan Information

Synopsis

This plugin displays information about the Nessus scan.

Description

This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.

ls
- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.

ia
- The port range scanned.
- The ping round trip time

nt
- Whether credentialed or third-party patch management checks are possible.
- Whether the display of superseded patches is enabled
- The date of the scan.
se
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.
Es

Solution

n/a
us

Risk Factor

None
ss

Plugin Information
Ne

Published: 2005/08/26, Modified: 2024/10/04

Plugin Output

192.168.11.129 (tcp/0)

Information about this scan :

Nessus version : 10.8.3


Nessus build : 20010
Plugin feed version : 202412191226
Scanner edition used : Nessus Home
Scanner OS : WINDOWS
Scanner distribution : win-x86-64
Scan type : Normal

19506 (1) - Nessus Scan Information 139


Scan name : scanprojet
Scan policy used : Basic Network Scan
Scanner IP : 192.168.11.1
Port scanner(s) : nessus_syn_scanner
Port range : default
Ping RTT : 51.230 ms
Thorough tests : no
Experimental tests : no
Scan for Unpatched Vulnerabilities : no
Plugin debugging enabled : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : no
Credentialed checks : no
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : Detected
Allow post-scan editing : Yes
Nessus Plugin Signature Checking : Enabled
Audit File Signature Checking : Disabled
Scan Start Date : 2024/12/19 19:53 Morocco Standard Time
Scan duration : 706 sec
Scan for malware : no

19506 (1) - Nessus Scan Information 140


20094 (1) - VMware Virtual Machine Detection

Synopsis

The remote host is a VMware virtual machine.

Description

According to the MAC address of its network adapter, the remote host is a VMware virtual machine.

Solution

ls
Since it is physically accessible through the network, ensure that its configuration matches your
organization's security policy.

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2005/10/27, Modified: 2019/12/11

Plugin Output
Es

192.168.11.129 (tcp/0)
us

The remote host is a VMware virtual machine.


ss
Ne

20094 (1) - VMware Virtual Machine Detection 141


20108 (1) - Web Server / Application favicon.ico Vendor Fingerprinting

Synopsis

The remote web server contains a graphic image that is prone to information disclosure.

Description

The 'favicon.ico' file found on the remote web server belongs to a popular web server. This may be used to
fingerprint the web server.

ls
Solution

Remove the 'favicon.ico' file or create a custom one for your site.

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2005/10/28, Modified: 2020/06/12

Plugin Output
Es

192.168.11.129 (tcp/8180/www)
us

MD5 fingerprint : 4644f2d45601037b8423d45e13194c93


Web server : Apache Tomcat or Alfresco Community
ss
Ne

20108 (1) - Web Server / Application favicon.ico Vendor Fingerprinting 142


21186 (1) - A JP Connector Detection

Synopsis

There is an A JP connector listening on the remote host.

Description

The remote host is running an A JP (Apache JServ Protocol) connector, a service by which a standalone web
server such as Apache communicates over TCP with a Java servlet container such as Tomcat.

ls
See Also

http://tomcat.apache.org/connectors-doc/

ia
http://tomcat.apache.org/connectors-doc/ajp/ajpv13a.html

nt
Solution

n/a
se
Risk Factor

None
Es

Plugin Information

Published: 2006/04/05, Modified: 2019/11/22


us

Plugin Output

192.168.11.129 (tcp/8009/ajp13)
ss

The connector listing on this port supports the ajp13 protocol.


Ne

21186 (1) - A JP Connector Detection 143


25220 (1) - TCP/IP Timestamps Supported

Synopsis

The remote service implements TCP timestamps.

Description

The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that
the uptime of the remote host can sometimes be computed.

ls
See Also

http://www.ietf.org/rfc/rfc1323.txt

ia
Solution

nt
n/a

Risk Factor
se
None
Es

Plugin Information

Published: 2007/05/16, Modified: 2023/10/17

Plugin Output
us

192.168.11.129 (tcp/0)
ss
Ne

25220 (1) - TCP/IP Timestamps Supported 144


25240 (1) - Samba Server Detection

Synopsis

An SMB server is running on the remote host.

Description

The remote host is running Samba, a CIFS/SMB server for Linux and Unix.

See Also

ls
https://www.samba.org/

ia
Solution

n/a

Risk Factor

nt
se
None

Plugin Information
Es

Published: 2007/05/16, Modified: 2022/10/12

Plugin Output
us

192.168.11.129 (tcp/445/cifs)
ss
Ne

25240 (1) - Samba Server Detection 145


26024 (1) - PostgreSQL Server Detection

Synopsis

A database service is listening on the remote host.

Description

The remote service is a PostgreSQL database server, or a derivative such as EnterpriseDB.

See Also

ls
https://www.postgresql.org/

ia
Solution

Limit incoming traffic to this port if desired.

Risk Factor

nt
se
None

Plugin Information
Es

Published: 2007/09/14, Modified: 2023/05/24

Plugin Output
us

192.168.11.129 (tcp/5432/postgresql)
ss
Ne

26024 (1) - PostgreSQL Server Detection 146


35371 (1) - DNS Server hostname.bind Map Hostname Disclosure

Synopsis

The DNS server discloses the remote host name.

Description

It is possible to learn the remote host name by querying the remote DNS server for 'hostname.bind' in the
CHAOS domain.

ls
Solution

It may be possible to disable this feature. Consult the vendor's documentation for more information.

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2009/01/15, Modified: 2011/09/14

Plugin Output
Es

192.168.11.129 (udp/53/dns)
us

The remote host name is :

metasploitable
ss
Ne

35371 (1) - DNS Server hostname.bind Map Hostname Disclosure 147


35373 (1) - DNS Server DNSSEC Aware Resolver

Synopsis

The remote DNS resolver is DNSSEC-aware.

Description

The remote DNS resolver accepts DNSSEC options. This means that it may verify the authenticity of
DNSSEC protected zones if it is configured to trust their keys.

ls
Solution

n/a

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2009/01/15, Modified: 2013/11/21

Plugin Output
Es

192.168.11.129 (udp/53/dns)
us
ss
Ne

35373 (1) - DNS Server DNSSEC Aware Resolver 148


35716 (1) - Ethernet Card Manufacturer Detection

Synopsis

The manufacturer can be identified from the Ethernet OUI.

Description

Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are
registered by IEEE.

ls
See Also

https://standards.ieee.org/faqs/regauth.html

ia
http://www.nessus.org/u?794673b4

nt
Solution

n/a
se
Risk Factor

None
Es

Plugin Information

Published: 2009/02/19, Modified: 2020/05/13


us

Plugin Output

192.168.11.129 (tcp/0)
ss

The following card manufacturers were identified :


Ne

00:0C:29:B2:D5:F0 : VMware, Inc.

35716 (1) - Ethernet Card Manufacturer Detection 149


39446 (1) - Apache Tomcat Detection

Synopsis

The remote web server is an Apache Tomcat server.

Description

Nessus was able to detect a remote Apache Tomcat web server.

See Also

ls
https://tomcat.apache.org/

ia
Solution

n/a

Risk Factor

nt
se
None

References
Es

XREF IAVT:0001-T-0535

Plugin Information
us

Published: 2009/06/18, Modified: 2024/11/14

Plugin Output
ss

192.168.11.129 (tcp/8180/www)
Ne

URL : http://192.168.11.129:8180/
Version : 5.5
backported : 0
source : Apache Tomcat/5.5

39446 (1) - Apache Tomcat Detection 150


39520 (1) - Backported Security Patch Detection (SSH)

Synopsis

Security patches are backported.

Description

Security patches may have been 'backported' to the remote SSH server without changing its version
number.

Banner-based checks have been disabled to avoid false positives.

ls
Note that this test is informational only and does not denote any security problem.

ia
See Also

https://access.redhat.com/security/updates/backporting/?sc_cid=3093

Solution

nt
se
n/a

Risk Factor
Es

None

Plugin Information
us

Published: 2009/06/25, Modified: 2015/07/07

Plugin Output
ss

192.168.11.129 (tcp/22/ssh)
Ne

Give Nessus credentials to perform local checks.

39520 (1) - Backported Security Patch Detection (SSH) 151


39521 (1) - Backported Security Patch Detection (WWW)

Synopsis

Security patches are backported.

Description

Security patches may have been 'backported' to the remote HTTP server without changing its version
number.

Banner-based checks have been disabled to avoid false positives.

ls
Note that this test is informational only and does not denote any security problem.

ia
See Also

https://access.redhat.com/security/updates/backporting/?sc_cid=3093

Solution

nt
se
n/a

Risk Factor
Es

None

Plugin Information
us

Published: 2009/06/25, Modified: 2015/07/07

Plugin Output
ss

192.168.11.129 (tcp/80/www)
Ne

Give Nessus credentials to perform local checks.

39521 (1) - Backported Security Patch Detection (WWW) 152


42088 (1) - SMTP Service STARTTLS Command Support

Synopsis

The remote mail service supports encrypting traffic.

Description

The remote SMTP service supports the use of the 'STARTTLS' command to switch from a cleartext to an
encrypted communications channel.

ls
See Also

https://en.wikipedia.org/wiki/STARTTLS

ia
https://tools.ietf.org/html/rfc2487

nt
Solution

n/a
se
Risk Factor

None
Es

Plugin Information

Published: 2009/10/09, Modified: 2019/03/20


us

Plugin Output

192.168.11.129 (tcp/25/smtp)
ss

Here is the SMTP service's SSL certificate that Nessus was able to
collect after sending a 'STARTTLS' command :
Ne

------------------------------ snip ------------------------------


Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA

42088 (1) - SMTP Service STARTTLS Command Support 153


Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT


Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption


Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits


Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

------------------------------ snip --------- [...]

42088 (1) - SMTP Service STARTTLS Command Support 154


45590 (1) - Common Platform Enumeration (CPE)

Synopsis

It was possible to enumerate CPE names that matched on the remote system.

Description

By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform
Enumeration) matches for various hardware and software products found on a host.

Note that if an official CPE is not available for the product, this plugin computes the best possible CPE

ls
based on the information available from the scan.

ia
See Also

http://cpe.mitre.org/

nt
https://nvd.nist.gov/products/cpe

Solution
se
n/a
Es

Risk Factor

None

Plugin Information
us

Published: 2010/04/21, Modified: 2024/11/22

Plugin Output
ss

192.168.11.129 (tcp/0)
Ne

The remote operating system matched the following CPE :

cpe:/o:canonical:ubuntu_linux:8.04 -> Canonical Ubuntu Linux

Following application CPE's matched on the remote system :

cpe:/a:apache:http_server:2.2.8 -> Apache Software Foundation Apache HTTP Server


cpe:/a:apache:http_server:2.2.99 -> Apache Software Foundation Apache HTTP Server
cpe:/a:apache:tomcat:5.5 -> Apache Software Foundation Tomcat
cpe:/a:isc:bind:9.4. -> ISC BIND
cpe:/a:isc:bind:9.4.2 -> ISC BIND
cpe:/a:mysql:mysql:5.0.51a-3ubuntu5 -> MySQL MySQL
cpe:/a:openbsd:openssh:4.7 -> OpenBSD OpenSSH
cpe:/a:openbsd:openssh:4.7p1 -> OpenBSD OpenSSH
cpe:/a:php:php:5.2.4 -> PHP PHP
cpe:/a:php:php:5.2.4-2ubuntu5.10 -> PHP PHP
cpe:/a:postgresql:postgresql -> PostgreSQL

45590 (1) - Common Platform Enumeration (CPE) 155


cpe:/a:samba:samba:3.0.20 -> Samba Samba

45590 (1) - Common Platform Enumeration (CPE) 156


48204 (1) - Apache HTTP Server Version

Synopsis

It is possible to obtain the version number of the remote Apache HTTP server.

Description

The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the
version number from the banner.

ls
See Also

https://httpd.apache.org/

ia
Solution

nt
n/a

Risk Factor
se
None
Es

References

XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0530
us

Plugin Information

Published: 2010/07/30, Modified: 2023/08/17


ss

Plugin Output

192.168.11.129 (tcp/80/www)
Ne

URL : http://192.168.11.129/
Version : 2.2.99
Source : Server: Apache/2.2.8 (Ubuntu) DAV/2
backported : 1
modules : DAV/2
os : ConvertedUbuntu

48204 (1) - Apache HTTP Server Version 157


48243 (1) - PHP Version Detection

Synopsis

It was possible to obtain the version number of the remote PHP installation.

Description

Nessus was able to determine the version of PHP available on the remote web server.

Solution

ls
n/a

ia
Risk Factor

None

nt
References
se
XREF IAVT:0001-T-0936

Plugin Information
Es

Published: 2010/08/04, Modified: 2024/11/22

Plugin Output
us

192.168.11.129 (tcp/80/www)

Nessus was able to identify the following PHP version information :


ss

Version : 5.2.4-2ubuntu5.10
Source : X-Powered-By: PHP/5.2.4-2ubuntu5.10
Ne

48243 (1) - PHP Version Detection 158


51891 (1) - SSL Session Resume Supported

Synopsis

The remote host allows resuming SSL sessions.

Description

This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to
receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the
session ID in the second connection, the server maintains a cache of sessions that can be resumed.

ls
Solution

ia
n/a

Risk Factor

nt
None se
Plugin Information

Published: 2011/02/07, Modified: 2021/09/13


Es

Plugin Output

192.168.11.129 (tcp/25/smtp)
us

This port supports resuming SSLv3 sessions.


ss
Ne

51891 (1) - SSL Session Resume Supported 159


52703 (1) - vsftpd Detection

Synopsis

An FTP server is listening on the remote port.

Description

The remote host is running vsftpd, an FTP server for UNIX-like systems written in C.

See Also

ls
http://vsftpd.beasts.org/

ia
Solution

n/a

Risk Factor

nt
se
None

Plugin Information
Es

Published: 2011/03/17, Modified: 2019/11/22

Plugin Output
us

192.168.11.129 (tcp/21/ftp)

Source : 220 (vsFTPd 2.3.4)


ss

Version : 2.3.4
Ne

52703 (1) - vsftpd Detection 160


53335 (1) - RPC portmapper (TCP)

Synopsis

An ONC RPC portmapper is running on the remote host.

Description

The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host
by sending either multiple lookup requests or a DUMP request.

ls
Solution

ia
n/a

nt
Risk Factor

None
se
Plugin Information

Published: 2011/04/08, Modified: 2011/08/29


Es

Plugin Output

192.168.11.129 (tcp/111/rpc-portmapper)
us
ss
Ne

53335 (1) - RPC portmapper (TCP) 161


54615 (1) - Device Type

Synopsis

It is possible to guess the remote device type.

Description

Based on the remote operating system, it is possible to determine what the remote system type is (eg: a
printer, router, general-purpose computer, etc).

ls
Solution

n/a

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2011/05/23, Modified: 2022/09/09

Plugin Output
Es

192.168.11.129 (tcp/0)

Remote device type : general-purpose


us

Confidence level : 95
ss
Ne

54615 (1) - Device Type 162


65792 (1) - VNC Server Unencrypted Communication Detection

Synopsis

A VNC server with one or more unencrypted 'security-types' is running on the remote host.

Description

This script checks the remote VNC server protocol version and the available 'security types' to determine if
any unencrypted 'security-types' are in use or available.

ls
Solution

n/a

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2013/04/03, Modified: 2014/03/12

Plugin Output
Es

192.168.11.129 (tcp/5900/vnc)
us

The remote VNC server supports the following security type


which does not perform full data communication encryption :

2 (VNC authentication)
ss
Ne

65792 (1) - VNC Server Unencrypted Communication Detection 163


66334 (1) - Patch Report

Synopsis

The remote host is missing several patches.

Description

The remote host is missing one or more security patches. This plugin lists the newest version of each patch
to install to make sure the remote host is up-to-date.

Note: Because the 'Show missing patches that have been superseded' setting in your scan policy depends

ls
on this plugin, it will always run and cannot be disabled.

ia
Solution

Install the patches listed below.

nt
Risk Factor

None
se
Plugin Information

Published: 2013/07/08, Modified: 2024/12/10


Es

Plugin Output

192.168.11.129 (tcp/0)
us

. You need to take the following 3 actions :


ss

[ ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS (139915) ]

+ Action to take : Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.


Ne

+Impact : Taking this action will resolve 3 different vulnerabilities (CVEs).

[ Samba Badlock Vulnerability (90509) ]

+ Action to take : Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later.

[ UnrealIRCd Backdoor Detection (46882) ]

+ Action to take : Re-download the software, verify it using the published MD5 / SHA1 checksums, and
re-install it.

66334 (1) - Patch Report 164


72779 (1) - DNS Server Version Detection

Synopsis

Nessus was able to obtain version information on the remote DNS server.

Description

Nessus was able to obtain version information by sending a special TXT record query to the remote host.

Note that this version is not necessarily accurate and could even be forged, as some DNS servers send the
information based on a configuration file.

ls
Solution

ia
n/a

nt
Risk Factor

None
se
References

XREF IAVT:0001-T-0030
Es

XREF IAVT:0001-T-0937

Plugin Information
us

Published: 2014/03/03, Modified: 2024/09/24

Plugin Output
ss

192.168.11.129 (tcp/53/dns)
Ne

DNS server answer for "version.bind" (over TCP) :

9.4.2

72779 (1) - DNS Server Version Detection 165


84574 (1) - Backported Security Patch Detection (PHP)

Synopsis

Security patches have been backported.

Description

Security patches may have been 'backported' to the remote PHP install without changing its version
number.

Banner-based checks have been disabled to avoid false positives.

ls
Note that this test is informational only and does not denote any security problem.

ia
See Also

https://access.redhat.com/security/updates/backporting/?sc_cid=3093

Solution

nt
se
n/a

Risk Factor
Es

None

Plugin Information
us

Published: 2015/07/07, Modified: 2024/11/22

Plugin Output
ss

192.168.11.129 (tcp/80/www)
Ne

Give Nessus credentials to perform local checks.

84574 (1) - Backported Security Patch Detection (PHP) 166


86420 (1) - Ethernet MAC Addresses

Synopsis

This plugin gathers MAC addresses from various sources and consolidates them into a list.

Description

This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and
Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single,
unique, and uniform list.

ls
Solution

ia
n/a

Risk Factor

nt
None se
Plugin Information

Published: 2015/10/16, Modified: 2020/05/13


Es

Plugin Output

192.168.11.129 (tcp/0)
us

The following is a consolidated list of detected MAC addresses:


- 00:0C:29:B2:D5:F0
ss
Ne

86420 (1) - Ethernet MAC Addresses 167


96982 (1) - Server Message Block (SMB) Protocol Version 1 Enabled
(uncredentialed check)

Synopsis

The remote Windows host supports the SMBv1 protocol.

Description

The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft
recommends that users discontinue the use of SMBv1 due to the lack of security features that were
included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that

ls
affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-
CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.

ia
See Also

nt
https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-
smbv3-in-windows-and
se
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?234f8ef8
http://www.nessus.org/u?4c7e0cf3
Es

Solution

Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB
us

directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block
TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.

Risk Factor
ss

None
Ne

References

XREF IAVT:0001-T-0710

Plugin Information

Published: 2017/02/03, Modified: 2020/09/22

Plugin Output

192.168.11.129 (tcp/445/cifs)

96982 (1) - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check) 168
The remote host supports SMBv1.

96982 (1) - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check) 169
100871 (1) - Microsoft Windows SMB Versions Supported (remote check)

Synopsis

It was possible to obtain information about the version of SMB running on the remote host.

Description

Nessus was able to obtain the version of SMB running on the remote host by sending an authentication
request to port 139 or 445.

Note that this plugin is a remote check and does not work on agents.

ls
Solution

ia
n/a

nt
Risk Factor

None
se
Plugin Information

Published: 2017/06/19, Modified: 2019/11/22


Es

Plugin Output

192.168.11.129 (tcp/445/cifs)
us

The remote host supports the following versions of SMB :


SMBv1
ss
Ne

100871 (1) - Microsoft Windows SMB Versions Supported (remote check) 170
104887 (1) - Samba Version

Synopsis

It was possible to obtain the samba version from the remote operating system.

Description

Nessus was able to obtain the samba version from the remote operating by sending an authentication
request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.

ls
Solution

n/a

ia
Risk Factor

nt
None

Plugin Information
se
Published: 2017/11/30, Modified: 2019/11/22

Plugin Output
Es

192.168.11.129 (tcp/445/cifs)
us

The remote Samba Version is : Samba 3.0.20-Debian


ss
Ne

104887 (1) - Samba Version 171


106716 (1) - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote
check)

Synopsis

It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.

Description

Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an
authentication request to port 139 or 445.

ls
Solution

ia
n/a

Risk Factor

nt
None se
Plugin Information

Published: 2018/02/09, Modified: 2020/03/11


Es

Plugin Output

192.168.11.129 (tcp/445/cifs)
us

The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.0.2 Windows 2008
2.1 Windows 7
ss

2.2.2 Windows 8 Beta


2.2.4 Windows 8 Beta
3.0 Windows 8
3.0.2 Windows 8.1
3.1 Windows 10
Ne

3.1.1 Windows 10

106716 (1) - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check) 172
110723 (1) - Target Credential Status by Authentication Protocol - No Credentials
Provided

Synopsis

Nessus was able to find common ports used for local checks, however, no credentials were provided in the
scan policy.

Description

Nessus was not able to successfully authenticate directly to the remote target on an available
authentication protocol. Nessus was able to connect to the remote port and identify that the service

ls
running on the port supports an authentication protocol, but Nessus failed to authenticate to the
remote service using the provided credentials. There may have been a protocol failure that prevented
authentication from being attempted or all of the provided credentials for the authentication protocol may

ia
be invalid. See plugin output for error details.

Please note the following :

nt
- This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and
not another. For example, authentication may succeed via SSH but fail via SMB, while no credentials were
provided for an available SNMP service.
se
- Providing valid credentials for all available authentication protocols may improve scan coverage, but the
value of successful authentication for a given protocol may vary from target to target depending upon what
data (if any) is gathered from the target via that protocol. For example, successful authentication via SSH is
Es

more valuable for Linux targets than for Windows targets, and likewise successful authentication via SMB is
more valuable for Windows targets than for Linux targets.

Solution
us

n/a

Risk Factor
ss

None
Ne

References

XREF IAVB:0001-B-0504

Plugin Information

Published: 2018/06/27, Modified: 2024/04/19

Plugin Output

192.168.11.129 (tcp/0)

SSH was detected on port 22 but no credentials were provided.

110723 (1) - Target Credential Status by Authentication Protocol - No Credentials Provided 173
SSH local checks were not enabled.

110723 (1) - Target Credential Status by Authentication Protocol - No Credentials Provided 174
117886 (1) - OS Security Patch Assessment Not Available

Synopsis

OS Security Patch Assessment is not available.

Description

OS Security Patch Assessment is not available on the remote host.


This does not necessarily indicate a problem with the scan.
Credentials may not have been provided, OS security patch assessment may not be supported for the

ls
target, the target may not have been identified, or another issue may have occurred that prevented OS
security patch assessment from being available. See plugin output for details.

ia
This plugin reports non-failure information impacting the availability of OS Security Patch Assessment.
Failure information is reported by plugin 21745 : 'OS Security Patch Assessment failed'. If a target host is
not supported for OS Security Patch Assessment, plugin 110695 : 'OS Security Patch Assessment Checks

nt
Not Supported' will report concurrently with this plugin.

Solution
se
n/a

Risk Factor
Es

None

References
us

XREF IAVB:0001-B-0515

Plugin Information
ss

Published: 2018/10/02, Modified: 2021/07/12


Ne

Plugin Output

192.168.11.129 (tcp/0)

The following issues were reported :

- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided
Message :
Credentials were not provided for detected SSH service.

117886 (1) - OS Security Patch Assessment Not Available 175


118224 (1) - PostgreSQL STARTTLS Support

Synopsis

The remote service supports encrypting traffic.

Description

The remote PostgreSQL server supports the use of encryption initiated during pre-login to switch from a
cleartext to an encrypted communications channel.

ls
See Also

https://www.postgresql.org/docs/9.2/protocol-flow.html#AEN96066

ia
https://www.postgresql.org/docs/9.2/protocol-message-formats.html

nt
Solution

n/a
se
Risk Factor

None
Es

Plugin Information

Published: 2018/10/19, Modified: 2022/04/11


us

Plugin Output

192.168.11.129 (tcp/5432/postgresql)
ss

Here is the PostgreSQL's SSL certificate that Nessus


was able to collect after sending a pre-login packet :
Ne

------------------------------ snip ------------------------------


Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA

118224 (1) - PostgreSQL STARTTLS Support 176


Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT


Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption


Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits


Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

------------------------------ snip ------------ [...]

118224 (1) - PostgreSQL STARTTLS Support 177


135860 (1) - WMI Not Available

Synopsis

WMI queries could not be made against the remote host.

Description

WMI (Windows Management Instrumentation) is not available on the remote host over DCOM. WMI
queries are used to gather information about the remote host, such as its current state, network interface
configuration, etc.

ls
Without this information Nessus may not be able to identify installed software or security vunerabilities
that exist on the remote host.

ia
See Also

https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-start-page

Solution
nt
se
n/a

Risk Factor
Es

None

Plugin Information
us

Published: 2020/04/21, Modified: 2024/11/22

Plugin Output
ss

192.168.11.129 (tcp/445/cifs)
Ne

Can't connect to the 'root\CIMV2' WMI namespace.

135860 (1) - WMI Not Available 178


149334 (1) - SSH Password Authentication Accepted

Synopsis

The SSH server on the remote host accepts password authentication.

Description

The SSH server on the remote host accepts password authentication.

See Also

ls
https://tools.ietf.org/html/rfc4252#section-8

ia
Solution

n/a

Risk Factor

nt
se
None

Plugin Information
Es

Published: 2021/05/07, Modified: 2021/05/07

Plugin Output
us

192.168.11.129 (tcp/22/ssh)
ss
Ne

149334 (1) - SSH Password Authentication Accepted 179


181418 (1) - OpenSSH Detection

Synopsis

An OpenSSH-based SSH server was detected on the remote host.

Description

An OpenSSH-based SSH server was detected on the remote host.

See Also

ls
https://www.openssh.com/

ia
Solution

n/a

Risk Factor

nt
se
None

Plugin Information
Es

Published: 2023/09/14, Modified: 2024/12/18

Plugin Output
us

192.168.11.129 (tcp/22/ssh)

Service : ssh
ss

Version : 4.7p1
Banner : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
Ne

181418 (1) - OpenSSH Detection 180

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy